In pfSense CE /usr/local/www/suricata/suricata_filecheck...
Moderate severity
Unreviewed
Published
Sep 9, 2025
to the GitHub Advisory Database
•
Updated Sep 9, 2025
Description
Published by the National Vulnerability Database
Sep 9, 2025
Published to the GitHub Advisory Database
Sep 9, 2025
Last updated
Sep 9, 2025
In pfSense CE /usr/local/www/suricata/suricata_filecheck.php, the value of the filehash parameter is directly displayed without sanitizing for HTML-related characters/strings. This can result in reflected cross-site scripting if the victim is authenticated.
References