In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.
References
Configurations
History
17 Oct 2025, 19:46
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pfsense
Pfsense pfsense |
|
| CPE | cpe:2.3:a:pfsense:pfsense:*:*:*:*:community:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://github.com/pfsense/FreeBSD-ports/commit/97852ccfd201b24ee542be30af81272485fde0b4 - Patch | |
| References | () https://redmine.pfsense.org/issues/16414 - Issue Tracking | |
| References | () https://www.vulncheck.com/advisories/netgate-pf-sense-ce-suricata-directory-traversal-information-disclosure - Third Party Advisory |
17 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Sep 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-09 21:15
Updated : 2025-10-17 19:46
NVD link : CVE-2025-34176
Mitre link : CVE-2025-34176
CVE.ORG link : CVE-2025-34176
JSON object : View
Products Affected
pfsense
- pfsense
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
