CVE-2025-34116

Public Exploit
IPFire < 2.19 Core Update 101 proxy.cgi RCE

Description

A remote command execution vulnerability exists in IPFire before version 2.19 Core Update 101 via the 'proxy.cgi' CGI interface. An authenticated attacker can inject arbitrary shell commands through crafted values in the NCSA user creation form fields, leading to command execution with web server privileges.

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
EPSS 0.65% Top 30%
Vendor Advisory ipfire.org
Affected: IPFire Project IPFire
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-34116?
CVE-2025-34116 has been scored as a high severity vulnerability.
How to fix CVE-2025-34116?
To fix CVE-2025-34116, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-34116 being actively exploited in the wild?
It is possible that CVE-2025-34116 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-34116?
CVE-2025-34116 affects IPFire Project IPFire.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.