Unrated severityNVD Advisory· Published Oct 28, 2025· Updated Oct 28, 2025
IPFire < v2.29 SQL Injection via OpenVPN Connection Logs
CVE-2025-34304
Description
IPFire versions prior to 2.29 (Core Update 198) contain a SQL injection vulnerability that allows an authenticated attacker to manipulate the SQL query used when viewing OpenVPN connection logs via the CONNECTION_NAME parameter. When viewing a range of OpenVPN connection logs, the application issues an HTTP POST request to the Request-URI /cgi-bin/logs.cgi/ovpnclients.dat and inserts the value of the CONNECTION_NAME parameter directly into the WHERE clause without proper sanitization or parameterization. The unsanitized value can alter the executed query and be used to disclose sensitive information from the database.
Affected products
2- IPFire.org/IPFirev5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.ipfire.org/blog/ipfire-2-29-core-update-198-releasedmitrevendor-advisorypatch
- www.vulncheck.com/advisories/ipfire-sqli-via-openvpn-connection-logsmitrethird-party-advisory
- bugzilla.ipfire.org/show_bug.cgimitreissue-tracking
News mentions
0No linked articles in our index yet.