IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the PROT parameter when creating a new service. When a user adds a service, the application issues an HTTP POST request with the ACTION parameter set to saveservice, and the protocol type is specified in the PROT parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitization or encoding, allowing injected scripts to execute in the context of other users viewing the affected service entry.
History

Wed, 29 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Ipfire
Ipfire ipfire
Vendors & Products Ipfire
Ipfire ipfire

Tue, 28 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the PROT parameter when creating a new service. When a user adds a service, the application issues an HTTP POST request with the ACTION parameter set to saveservice, and the protocol type is specified in the PROT parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitization or encoding, allowing injected scripts to execute in the context of other users viewing the affected service entry.
Title IPFire < v2.29 Stored XSS via Service Creation
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-28T14:33:32.017Z

Updated: 2025-10-29T19:00:31.741Z

Reserved: 2025-04-15T19:15:22.582Z

Link: CVE-2025-34302

cve-icon Vulnrichment

Updated: 2025-10-29T19:00:28.094Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2025-10-28T15:16:10.433

Modified: 2025-10-30T15:05:32.197

Link: CVE-2025-34302

cve-icon Redhat

No data.