IPFire 2.29 DNS management interface (dns.cgi) fails to properly sanitize user-supplied input in the NAMESERVER, REMARK, and TLS_HOSTNAME query parameters, resulting in a reflected cross-site scripting (XSS) vulnerability.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 09 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:2.29:-:*:*:*:*:*:* | 
Wed, 27 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics | cvssV3_1 
 
 | 
Wed, 27 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Ipfire Ipfire ipfire | |
| Vendors & Products | Ipfire Ipfire ipfire | 
Tue, 26 Aug 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IPFire 2.29 DNS management interface (dns.cgi) fails to properly sanitize user-supplied input in the NAMESERVER, REMARK, and TLS_HOSTNAME query parameters, resulting in a reflected cross-site scripting (XSS) vulnerability. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-08-26T00:00:00.000Z
Updated: 2025-08-27T16:20:49.320Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50976
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-27T16:20:44.900Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-08-26T18:15:47.427
Modified: 2025-09-09T18:55:44.197
Link: CVE-2025-50976
 Redhat
                        Redhat
                    No data.