CVE-2025-34176

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-34176
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-34176.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-34176
Published
2025-09-09T21:15:35Z
Modified
2025-11-16T15:39:58.518146Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

In pfSense CE /suricata/suricataipreputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.

References

Affected packages

Git / github.com/pfsense/freebsd-ports

Affected ranges

Type
GIT
Repo
https://github.com/pfsense/freebsd-ports
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

END-OF-2015Q4
devel_before_hashes_changed