In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authenticated.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 09 Sep 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 09 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authenticated. | |
Title | Netgate pfSense CE Suricata package v7.0.8_2 Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-09T20:23:06.131Z
Reserved: 2025-04-15T19:15:22.567Z
Link: CVE-2025-34175

Updated: 2025-09-09T20:22:25.521Z

Status : Received
Published: 2025-09-09T20:15:38.903
Modified: 2025-09-09T20:15:38.903
Link: CVE-2025-34175

No data.

No data.