CVE-2025-34116
IPFire < 2.19 Core Update 101 proxy.cgi RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.
| CWE | CWE-78 CWE-20 CWE-306 |
| Vendor | ipfire project |
| Product | ipfire |
| Published | Jul 15, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for ipfire project ipfire
Be the first to know when new unknown vulnerabilities affecting ipfire project ipfire are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
IPFire Project / IPFire
* < 2.19 Core Update 101
References
ipfire.org: https://www.ipfire.org/news/ipfire-2-19-core-update-101-released raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ipfire_proxy_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/39765 asafety.fr: https://www.asafety.fr/en/vuln-exploit-poc/xss-rce-ipfire-2-19-core-update-101-remote-command-execution/ bugzilla.ipfire.org: https://bugzilla.ipfire.org/show_bug.cgi?id=11087 vulncheck.com: https://www.vulncheck.com/advisories/ipfire-authenticated-rce
Credits
Yann Cam