In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authenticated.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Sep 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Description In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authenticated.
Title Netgate pfSense CE Suricata package v7.0.8_2 Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-09-09T20:23:06.131Z

Reserved: 2025-04-15T19:15:22.567Z

Link: CVE-2025-34175

cve-icon Vulnrichment

Updated: 2025-09-09T20:22:25.521Z

cve-icon NVD

Status : Received

Published: 2025-09-09T20:15:38.903

Modified: 2025-09-09T20:15:38.903

Link: CVE-2025-34175

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.