CVE-2025-53392
BaseFortify
Publication date: 2025-06-28
Last updated on: 2025-10-15
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pfsense | pfsense | 2.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-36 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
In Netgate pfSense CE 2.8.0, the 'WebCfg - Diagnostics: Command' privilege allows a user to read arbitrary files on the system by exploiting a directory traversal vulnerability in the diag_command.php dlPath parameter. This means that someone with this privilege can access files outside the intended directories. However, the supplier considers this behavior intended for this privilege level and informs system administrators about it through documentation and the user interface.
How can this vulnerability impact me? :
This vulnerability can allow a user with the 'WebCfg - Diagnostics: Command' privilege to read arbitrary files on the system, potentially exposing sensitive information. Since it allows reading files outside of intended directories, it could lead to unauthorized disclosure of data. The impact is limited to confidentiality and requires the user to have this specific privilege.