We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.
Reserved 2025-04-15 | Published 2025-07-15 | Updated 2025-07-15 | Assigner VulnCheckCWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-20 Improper Input Validation
CWE-306 Missing Authentication for Critical Function
Yann Cam
www.ipfire.org/news/ipfire-2-19-core-update-101-released
raw.githubusercontent.com/...linux/http/ipfire_proxy_exec.rb
www.exploit-db.com/exploits/39765
www.asafety.fr/...-core-update-101-remote-command-execution/
bugzilla.ipfire.org/show_bug.cgi?id=11087
www.vulncheck.com/advisories/ipfire-authenticated-rce
Support options