CVE-2025-34176
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-10-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pfsense | pfsense | to 2.8.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability allows an attacker with certain authenticated permissions to enumerate files on the server, potentially revealing sensitive file existence information. This could aid in further attacks or reconnaissance, compromising system security and privacy.
Can you explain this vulnerability to me?
This vulnerability exists in pfSense CE's suricata_ip_reputation.php where the iplist parameter is not properly sanitized for directory traversal characters. This allows an authenticated attacker with specific permissions to check if arbitrary files exist on the server by exploiting the file existence check, enabling file enumeration without reading file contents.