Vulnerability Database

308,926

Total vulnerabilities in the database

CVE-2025-34312

IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the 'nobody' user via the BE_NAME parameter when installing a blacklist. When a blacklist is installed the application issues an HTTP POST to /cgi-bin/urlfilter.cgi and interpolates the value of BE_NAME directly into a shell invocation without appropriate sanitation. Crafted input can inject shell metacharacters, leading to arbitrary command execution in the context of the 'nobody' user.

  • Published: Oct 28, 2025
  • Updated: Nov 4, 2025
  • CVE: CVE-2025-34312
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 8.8
  • AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CWEs:

OWASP TOP 10:

Software From Fixed in
ipfire / ipfire - 2.29
ipfire / ipfire 2.29-core_update183 2.29-core_update183.x
ipfire / ipfire 2.29-core_update184 2.29-core_update184.x
ipfire / ipfire 2.29-core_update185 2.29-core_update185.x
ipfire / ipfire 2.29-core_update186 2.29-core_update186.x
ipfire / ipfire 2.29-core_update187 2.29-core_update187.x
ipfire / ipfire 2.29-core_update188 2.29-core_update188.x
ipfire / ipfire 2.29-core_update189 2.29-core_update189.x
ipfire / ipfire 2.29-core_update190 2.29-core_update190.x
ipfire / ipfire 2.29-core_update191 2.29-core_update191.x
ipfire / ipfire 2.29-core_update192 2.29-core_update192.x
ipfire / ipfire 2.29-core_update193 2.29-core_update193.x
ipfire / ipfire 2.29-core_update194 2.29-core_update194.x
ipfire / ipfire 2.29-core_update195 2.29-core_update195.x
ipfire / ipfire 2.29-core_update196 2.29-core_update196.x
ipfire / ipfire 2.29-core_update197 2.29-core_update197.x