Vulnerability Description
IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the QUOTA_USERS parameter when creating a user quota rule. When a user adds a new user quota rule the application issues an HTTP POST request to /cgi-bin/urlfilter.cgi with the MODE parameter set to USERQUOTA and the assigned user(s) provided in the QUOTA_USERS parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected quota entry.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipfire | Ipfire | < 2.29 |
Related Weaknesses (CWE)
References
- https://bugzilla.ipfire.org/show_bug.cgi?id=13888Issue TrackingThird Party Advisory
- https://www.ipfire.org/blog/ipfire-2-29-core-update-198-releasedRelease Notes
- https://www.vulncheck.com/advisories/ipfire-stored-xss-via-user-quota-rule-url-fThird Party Advisory
FAQ
What is CVE-2025-34313?
CVE-2025-34313 is a vulnerability with a CVSS score of 5.4 (MEDIUM). IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the QUOTA_US...
How severe is CVE-2025-34313?
CVE-2025-34313 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-34313?
Check the references section above for vendor advisories and patch information. Affected products include: Ipfire Ipfire.