IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the 'nobody' user via the BE_NAME parameter when installing a blacklist. When a blacklist is installed the application issues an HTTP POST to /cgi-bin/urlfilter.cgi and interpolates the value of BE_NAME directly into a shell invocation without appropriate sanitation. Crafted input can inject shell metacharacters, leading to arbitrary command execution in the context of the 'nobody' user.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Ipfire Ipfire ipfire | |
| Vendors & Products | Ipfire Ipfire ipfire | 
Tue, 28 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 28 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the 'nobody' user via the BE_NAME parameter when installing a blacklist. When a blacklist is installed the application issues an HTTP POST to /cgi-bin/urlfilter.cgi and interpolates the value of BE_NAME directly into a shell invocation without appropriate sanitation. Crafted input can inject shell metacharacters, leading to arbitrary command execution in the context of the 'nobody' user. | |
| Title | IPFire < v2.29 Command Injection via URL Filter Blacklist | |
| Weaknesses | CWE-78 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-28T14:37:47.417Z
Updated: 2025-10-28T15:17:00.706Z
Reserved: 2025-04-15T19:15:22.583Z
Link: CVE-2025-34312
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-28T15:16:57.115Z
 NVD
                        NVD
                    Status : Undergoing Analysis
Published: 2025-10-28T15:16:11.510
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-34312
 Redhat
                        Redhat
                    No data.