Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opnsense opnsense
|
|
| CPEs | cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opnsense opnsense
|
Thu, 14 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opnsense
Opnsense core |
|
| Vendors & Products |
Opnsense
Opnsense core |
Wed, 13 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, the XMLRPC method opnsense.restore_config_section fails to sanitize user supplied input leading to Remote Code Execution. This vulnerability is fixed in 26.1.7. | |
| Title | OPNsense: RCE via XMLRPC endpoint using `opnsense.restore_config_section` method | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T19:51:59.948Z
Reserved: 2026-05-05T15:13:47.570Z
Link: CVE-2026-44193
Updated: 2026-05-14T16:03:41.951Z
Status : Analyzed
Published: 2026-05-13T22:16:43.533
Modified: 2026-05-15T17:30:03.117
Link: CVE-2026-44193
No data.
OpenCVE Enrichment
Updated: 2026-05-13T23:30:06Z