IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the SRC, DST, and COMMENT parameters when creating a time constraint rule. When a user adds a time constraint rule the application issues an HTTP POST request to /cgi-bin/urlfilter.cgi with the MODE parameter set to TIMECONSTRAINT and the source hostnames/IPs, destination, and remark provided in the SRC, DST, and COMMENT parameters respectively. The values of these parameters are stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected time constraint entry.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Ipfire Ipfire ipfire | |
| Vendors & Products | Ipfire Ipfire ipfire | 
Tue, 28 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the SRC, DST, and COMMENT parameters when creating a time constraint rule. When a user adds a time constraint rule the application issues an HTTP POST request to /cgi-bin/urlfilter.cgi with the MODE parameter set to TIMECONSTRAINT and the source hostnames/IPs, destination, and remark provided in the SRC, DST, and COMMENT parameters respectively. The values of these parameters are stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected time constraint entry. | |
| Title | IPFire < v2.29 Stored XSS via Time Constraint Rule URL Filter | |
| Weaknesses | CWE-79 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-28T14:33:09.667Z
Updated: 2025-10-29T18:26:57.565Z
Reserved: 2025-04-15T19:15:22.584Z
Link: CVE-2025-34314
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-29T18:26:53.983Z
 NVD
                        NVD
                    Status : Undergoing Analysis
Published: 2025-10-28T15:16:11.720
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-34314
 Redhat
                        Redhat
                    No data.