Pfsense

Pfsense

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 00:00:00
  • Zuletzt bearbeitet 12.05.2026 20:39:48

Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Supplier disputes this because the API call is only available to admins and they are intentionally allowed to execute PHP code.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.05.2026 00:00:00
  • Zuletzt bearbeitet 12.05.2026 13:45:34

Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file with a serialized PHP object containing the post_reboot_commands property. NOTE: the Supplier disputes this because this installer is only available to ad...

  • EPSS 0.02%
  • Veröffentlicht 09.09.2025 20:23:44
  • Zuletzt bearbeitet 10.10.2025 18:42:08

In pfSense CE /suricata/suricata_app_parsers.php, the value of the policy_name parameter is not sanitized of HTML-related strings/characters before being directly displayed. This can result in stored cross-site scripting. The attacker must be authent...

  • EPSS 0.02%
  • Veröffentlicht 09.09.2025 20:19:09
  • Zuletzt bearbeitet 10.10.2025 18:42:15

In pfSense CE /suricata/suricata_flow_stream.php, the value of the policy_name parameter is not sanitized of HTML-related strings/characters before being directly displayed. This can result in stored cross-site scripting. The attacker must be authent...

  • EPSS 0.05%
  • Veröffentlicht 09.09.2025 20:14:37
  • Zuletzt bearbeitet 17.10.2025 19:46:03

In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file ...

  • EPSS 0.04%
  • Veröffentlicht 09.09.2025 20:09:50
  • Zuletzt bearbeitet 10.10.2025 18:46:41

In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authent...

  • EPSS 0.03%
  • Veröffentlicht 09.09.2025 20:02:05
  • Zuletzt bearbeitet 10.10.2025 18:47:06

In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being directly displayed in the input box. This value can be save...

  • EPSS 0.06%
  • Veröffentlicht 09.09.2025 19:59:14
  • Zuletzt bearbeitet 20.10.2025 14:50:04

In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be rea...

  • EPSS 0.03%
  • Veröffentlicht 09.09.2025 19:43:30
  • Zuletzt bearbeitet 10.10.2025 18:47:46

In pfSense CE /usr/local/www/haproxy/haproxy_stats.php, the value of the showsticktablecontent parameter is displayed after being read from HTTP GET requests. This can enable reflected cross-site scripting when the victim is authenticated.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 28.06.2025 00:00:00
  • Zuletzt bearbeitet 15.10.2025 20:09:46

In Netgate pfSense CE 2.8.0, the "WebCfg - Diagnostics: Command" privilege allows reading arbitrary files via diag_command.php dlPath directory traversal. NOTE: the Supplier's perspective is that this is intended behavior for this privilege level, an...