Description
OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, multiple OPNsense MVC API endpoints perform state‑changing operations but are accessible via HTTP GET requests without CSRF protection. The framework CSRF validation in ApiControllerBase only applies to POST/PUT/DELETE methods, allowing authenticated GET requests to bypass CSRF verification. As a result, a malicious website can trigger privileged backend actions when visited by an authenticated user, causing unintended service reloads and configuration changes through configd. This results in an authenticated Cross‑Site Request Forgery vulnerability allowing unauthorized system state changes. This vulnerability is fixed in 26.1.4.
Published: 2026-03-11
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated CSRF leading to unauthorized configuration changes
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to execute authenticated CSRF attacks against OPNsense. Multiple MVC API endpoints can perform state‑changing operations when accessed with HTTP GET requests without CSRF validation. A malicious website can cause an authenticated user to trigger privileged backend actions, resulting in unintended service reloads and configuration changes via configd. The primary impact is the ability to alter system configuration while the user is authenticated, which can lead to denial of service or other unintended behavior.

Affected Systems

All OPNsense core installations with versions prior to 26.1.4 are affected. The vendor identified the product as opnsense:core. The specific affected releases are those older than 26.1.4, as noted in the vendor advisory.

Risk and Exploitability

The CVSS score of 6.3 indicates a medium severity vulnerability. The EPSS score is below 1%, suggesting that current exploitation attempts are low. The vulnerability is not listed in the CISA KEV catalog. Exposition requires an authenticated session; the attack vector is a web-based CSRF triggered by a malicious site. Because the attacker needs a legitimate authenticated user to visit a malicious site, exploitation likelihood depends on user behavior and threat actor resources

Generated by OpenCVE AI on March 17, 2026 at 20:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OPNsense 26.1.4 or later

Generated by OpenCVE AI on March 17, 2026 at 20:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Opnsense opnsense
CPEs cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:*
Vendors & Products Opnsense opnsense

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Opnsense
Opnsense core
Vendors & Products Opnsense
Opnsense core

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, multiple OPNsense MVC API endpoints perform state‑changing operations but are accessible via HTTP GET requests without CSRF protection. The framework CSRF validation in ApiControllerBase only applies to POST/PUT/DELETE methods, allowing authenticated GET requests to bypass CSRF verification. As a result, a malicious website can trigger privileged backend actions when visited by an authenticated user, causing unintended service reloads and configuration changes through configd. This results in an authenticated Cross‑Site Request Forgery vulnerability allowing unauthorized system state changes. This vulnerability is fixed in 26.1.4.
Title Cross-Site Request Forgery (CSRF) in opnsense/core
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T17:20:20.867Z

Reserved: 2026-03-05T21:27:35.343Z

Link: CVE-2026-30868

cve-icon Vulnrichment

Updated: 2026-03-11T17:14:16.842Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T17:16:57.937

Modified: 2026-03-17T19:13:04.247

Link: CVE-2026-30868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:26Z

Weaknesses