Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34310: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IPFire.org IPFire

0
Medium
VulnerabilityCVE-2025-34310cvecve-2025-34310cwe-79
Published: Tue Oct 28 2025 (10/28/2025, 14:34:18 UTC)
Source: CVE Database V5
Vendor/Project: IPFire.org
Product: IPFire

Description

IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the INC_SPD, OUT_SPD, DEFCLASS_INC, and DEFCLASS_OUT parameters when updating Quality of Service (QoS) settings. When a user updates speeds or classes, the application issues an HTTP POST request to /cgi-bin/qos.cgi and the values for incoming/outgoing speeds and default classes are provided in the INC_SPD, OUT_SPD, DEFCLASS_INC, and DEFCLASS_OUT parameters. The values of these parameters are stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected QoS entries.

AI-Powered Analysis

AILast updated: 11/05/2025, 02:08:42 UTC

Technical Analysis

CVE-2025-34310 is a stored cross-site scripting (XSS) vulnerability identified in IPFire, an open-source firewall distribution widely used for network security. The vulnerability exists in versions prior to 2.29 (Core Update 198) and arises from improper neutralization of input during web page generation, specifically in the Quality of Service (QoS) configuration interface. Authenticated users can exploit this flaw by injecting malicious JavaScript code into the INC_SPD, OUT_SPD, DEFCLASS_INC, and DEFCLASS_OUT parameters via HTTP POST requests to /cgi-bin/qos.cgi when updating QoS settings. These parameters are stored and later rendered in the web interface without adequate sanitization or encoding, enabling the execution of injected scripts in the browsers of other users who access the QoS configuration pages. The vulnerability requires the attacker to have valid credentials (authenticated access) but does not require additional user interaction beyond viewing the affected pages. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond authentication, and no user interaction needed, with limited scope and impact confined to confidentiality and integrity. While no public exploits are currently known, the vulnerability poses risks such as session hijacking, credential theft, or unauthorized actions within the IPFire management interface. This flaw highlights the importance of input validation and output encoding in web applications, especially in administrative interfaces of security-critical products like firewalls.

Potential Impact

For European organizations deploying IPFire as part of their network security infrastructure, this vulnerability could lead to unauthorized execution of malicious scripts within the administrative web interface. Potential impacts include session hijacking of administrators, theft of sensitive credentials, unauthorized configuration changes, and possible lateral movement within the network if attackers leverage the compromised interface. Given that IPFire is often used in small to medium enterprises and some public sector environments across Europe, exploitation could disrupt network security management and lead to broader compromise. The requirement for authenticated access limits the attack surface but insider threats or compromised credentials could enable exploitation. The vulnerability could also undermine trust in network security controls and increase the risk of data breaches or service disruptions. Organizations with remote or multi-administrator setups are particularly at risk if attackers can inject scripts that execute in other administrators’ browsers. Although no known exploits exist currently, the medium severity rating and the critical role of IPFire in network defense warrant proactive mitigation to prevent potential exploitation.

Mitigation Recommendations

1. Upgrade IPFire installations to version 2.29 (Core Update 198) or later, where this vulnerability is fixed. 2. If immediate upgrade is not possible, restrict access to the IPFire web interface to trusted networks and users only, minimizing exposure to authenticated attackers. 3. Enforce strong authentication mechanisms and regularly audit user accounts to prevent unauthorized access. 4. Implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the QoS parameters (INC_SPD, OUT_SPD, DEFCLASS_INC, DEFCLASS_OUT). 5. Educate administrators to avoid clicking on suspicious links or performing QoS updates from untrusted devices. 6. Monitor logs for unusual QoS configuration changes or repeated POST requests to /cgi-bin/qos.cgi. 7. Consider isolating the management interface from general user networks to reduce risk of cross-site scripting impact. 8. Apply Content Security Policy (CSP) headers if configurable in IPFire to limit script execution origins. These targeted steps go beyond generic advice by focusing on access control, monitoring, and specific parameter filtering relevant to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6900d7521e78ed0e5889e0b7

Added to database: 10/28/2025, 2:46:42 PM

Last enriched: 11/5/2025, 2:08:42 AM

Last updated: 12/14/2025, 6:57:26 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats