Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34306: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IPFire.org IPFire

0
Medium
VulnerabilityCVE-2025-34306cvecve-2025-34306cwe-79
Published: Tue Oct 28 2025 (10/28/2025, 14:36:54 UTC)
Source: CVE Database V5
Vendor/Project: IPFire.org
Product: IPFire

Description

IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the pienumber parameter when updating the default firewall IP search values. When a user updates these defaults, the application issues an HTTP POST request to /cgi-bin/logs.cgi/firewalllogip.dat with the default number of IPs in the pienumber parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected page.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:05:08 UTC

Technical Analysis

CVE-2025-34306 is a stored cross-site scripting (XSS) vulnerability identified in IPFire firewall software versions prior to 2.29 (Core Update 198). The vulnerability arises from improper neutralization of input during web page generation, specifically related to the 'pienumber' parameter used when updating the default number of IP addresses in firewall IP search values. When an authenticated user submits an HTTP POST request to /cgi-bin/logs.cgi/firewalllogip.dat with a crafted 'pienumber' value containing malicious JavaScript, this input is stored without proper sanitization or encoding. Subsequently, when other users access the affected web interface page, the malicious script executes in their browser context. This can lead to session hijacking, unauthorized actions, or information disclosure within the administrative interface. The vulnerability requires the attacker to have authenticated access and involves user interaction to trigger the malicious payload. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no attack or user interaction needed for exploitation, and limited scope impact. No public exploits have been reported yet, but the vulnerability poses a moderate risk given the administrative context of the affected interface.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized execution of scripts within the IPFire administrative interface, potentially enabling attackers to hijack sessions, manipulate firewall configurations, or gather sensitive information. Given IPFire's role as a firewall and network security appliance, compromise of its management interface could undermine perimeter defenses and lead to broader network exposure. Organizations in sectors with stringent security requirements, such as finance, healthcare, and critical infrastructure, may face increased risk of operational disruption or data breaches. The medium severity rating reflects the need for authentication and user interaction, which somewhat limits exploitation but does not eliminate risk, especially in environments with multiple administrators or less stringent access controls. Additionally, the stored nature of the XSS means multiple users could be affected once the malicious payload is injected.

Mitigation Recommendations

Organizations should upgrade IPFire installations to version 2.29 (Core Update 198) or later, where this vulnerability is addressed. If immediate patching is not feasible, administrators should restrict access to the IPFire web interface to trusted networks and users only, employing strong authentication mechanisms such as multi-factor authentication. Input validation and output encoding should be enforced at the application level to prevent injection of malicious scripts. Regularly auditing firewall logs and configuration changes can help detect suspicious activity. Additionally, educating administrators about the risks of stored XSS and cautious handling of input parameters can reduce the likelihood of exploitation. Network segmentation and limiting administrative interface exposure to the internet further reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6900d7521e78ed0e5889e0a3

Added to database: 10/28/2025, 2:46:42 PM

Last enriched: 10/28/2025, 3:05:08 PM

Last updated: 10/29/2025, 6:32:51 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats