CVE-2025-34182
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-01

Last updated on: 2025-10-02

Assigner: VulnCheck

Description
In Deciso OPNsense before 25.7.4, when creating an "Interfaces: Devices: Point-to-Point" entry, the value of the parameter ptpid is not sanitized of HTML-related characters/strings. This value is directly displayed when visiting the page/interfaces_assign.php, which can result in stored cross-site scripting. The attacker must be authenticated with at-least "Interfaces: PPPs: Edit" permission. This vulnerability has been addressed by the vendor in the product release notes asΒ "ui: legacy_html_escape_form_data() was not escaping keys only data elements."
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-01
Last Modified
2025-10-02
Generated
2026-05-07
AI Q&A
2025-10-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
deciso opnsense 25.7.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Deciso OPNsense before version 25.7.4 occurs because the parameter 'ptpid' in the 'Interfaces: Devices: Point-to-Point' entry is not properly sanitized for HTML-related characters. When this parameter is displayed on the page interfaces_assign.php, it can lead to stored cross-site scripting (XSS). An attacker with at least 'Interfaces: PPPs: Edit' permission can exploit this by injecting malicious HTML or scripts that get stored and executed when the page is viewed.


How can this vulnerability impact me? :

This vulnerability can allow an authenticated attacker with certain permissions to execute stored cross-site scripting attacks. This can lead to unauthorized script execution in the context of the affected web interface, potentially allowing the attacker to steal session tokens, perform actions on behalf of other users, or manipulate the interface, thereby compromising the security and integrity of the system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update Deciso OPNsense to version 25.7.4 or later where the issue has been fixed by properly escaping HTML characters in the ptpid parameter. Additionally, restrict access to users with "Interfaces: PPPs: Edit" permission to trusted personnel only.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart