CVE-2025-34301

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in IPFire allows authenticated attackers to inject malicious JavaScript into location group configurations. When other users view the affected page, the script executes in their browser context. Only IPFire firewall administrators with location group creation privileges are affected.

💻 Affected Systems

Products:
  • IPFire
Versions: All versions prior to 2.29 (Core Update 198)
Operating Systems: IPFire Linux distribution
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface with location group creation privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could steal session cookies, perform actions as other users, or redirect users to malicious sites, potentially compromising the entire firewall management interface.

🟠

Likely Case

An attacker with valid credentials could perform session hijacking, modify firewall settings, or deploy backdoors through the web interface.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the management interface with no direct access to underlying systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the web interface. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IPFire 2.29 (Core Update 198)

Vendor Advisory: https://www.ipfire.org/blog/ipfire-2-29-core-update-198-released

Restart Required: No

Instructions:

1. Log into IPFire web interface. 2. Navigate to System > Updates. 3. Apply Core Update 198. 4. Verify version shows 2.29.

🔧 Temporary Workarounds

Restrict Location Group Access

all

Limit location group creation/modification to trusted administrators only.

Input Validation via WAF

all

Deploy web application firewall rules to block XSS payloads in COUNTRY_CODE parameter.

🧯 If You Can't Patch

  • Restrict web interface access to trusted IP addresses only using firewall rules.
  • Implement strict session management and regularly rotate administrator credentials.

🔍 How to Verify

Check if Vulnerable:

Check IPFire version via web interface dashboard or SSH command: cat /etc/ipfire-release

Check Version:

cat /etc/ipfire-release

Verify Fix Applied:

Confirm version is 2.29 or higher and test location group creation with XSS payloads that should be sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/locationgrp.cgi with ACTION=savelocationgrp containing script tags in COUNTRY_CODE parameter
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • HTTP POST requests containing JavaScript payloads in parameters
  • Unusual outbound connections from firewall management interface

SIEM Query:

source="ipfire_web_logs" AND uri="/cgi-bin/locationgrp.cgi" AND method="POST" AND (param="COUNTRY_CODE" AND value CONTAINS "<script>" OR value CONTAINS "javascript:")

🔗 References

📤 Share & Export