CVE-2025-34304
28.10.2025, 15:16
IPFire versions prior to 2.29 (Core Update 198) contain a SQL injection vulnerability that allows an authenticated attacker to manipulate the SQL query used when viewing OpenVPN connection logs via the CONNECTION_NAME parameter. When viewing a range of OpenVPN connection logs, the application issues an HTTP POST request to the Request-URI /cgi-bin/logs.cgi/ovpnclients.dat and inserts the value of the CONNECTION_NAME parameter directly into the WHERE clausewithout proper sanitization or parameterization. The unsanitized value can alter the executed query and be used to disclose sensitive information from the database.
| Vendor | Product | Version |
|---|---|---|
| ipfire | ipfire | 𝑥 < 2.29 |
| ipfire | ipfire | 2.29:core_update183 |
| ipfire | ipfire | 2.29:core_update184 |
| ipfire | ipfire | 2.29:core_update185 |
| ipfire | ipfire | 2.29:core_update186 |
| ipfire | ipfire | 2.29:core_update187 |
| ipfire | ipfire | 2.29:core_update188 |
| ipfire | ipfire | 2.29:core_update189 |
| ipfire | ipfire | 2.29:core_update190 |
| ipfire | ipfire | 2.29:core_update191 |
| ipfire | ipfire | 2.29:core_update192 |
| ipfire | ipfire | 2.29:core_update193 |
| ipfire | ipfire | 2.29:core_update194 |
| ipfire | ipfire | 2.29:core_update195 |
| ipfire | ipfire | 2.29:core_update196 |
| ipfire | ipfire | 2.29:core_update197 |
𝑥
= Vulnerable software versions