Description
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
Published: 2025-09-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27472 In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
History

Thu, 20 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgate pfsense Plus
CPEs cpe:2.3:a:netgate:pfsense_plus:4.1.6_25:*:*:*:*:*:*:*
Vendors & Products Netgate pfsense Plus

Mon, 20 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Pfsense
Pfsense pfsense
CPEs cpe:2.3:a:pfsense:pfsense:*:*:*:*:community:*:*:*
Vendors & Products Pfsense
Pfsense pfsense
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Wed, 17 Sep 2025 17:30:00 +0000


Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgate
Netgate pfsense Ce
Vendors & Products Netgate
Netgate pfsense Ce

Wed, 10 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Description In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
Title Netgate pfSense CE Snort package v4.1.6_25 Directory Traversal Information Disclosure
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Netgate Pfsense Ce Pfsense Plus
Pfsense Pfsense
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-20T12:23:55.690Z

Reserved: 2025-04-15T19:15:22.567Z

Link: CVE-2025-34173

cve-icon Vulnrichment

Updated: 2025-09-10T20:18:37.883Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-09T20:15:38.560

Modified: 2025-10-20T14:50:04.643

Link: CVE-2025-34173

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-12T09:11:39Z

Weaknesses