CVE-2025-34116
Severity CVSS v4.0:
HIGH
Type:
CWE-20
Input Validation
Publication date:
15/07/2025
Last modified:
15/07/2025
Description
A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://bugzilla.ipfire.org/show_bug.cgi?id=11087
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ipfire_proxy_exec.rb
- https://www.asafety.fr/en/vuln-exploit-poc/xss-rce-ipfire-2-19-core-update-101-remote-command-execution/
- https://www.exploit-db.com/exploits/39765
- https://www.ipfire.org/news/ipfire-2-19-core-update-101-released
- https://www.vulncheck.com/advisories/ipfire-authenticated-rce



