CVE-2025-34176: Authenticated Directory Traversal in pfSense Suricata IP Rep
CVE-2025-34176 Published on September 9, 2025
Netgate pfSense CE Suricata Package v7.0.8_2 Directory Traversal Information Disclosure
In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2025-34176 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2025-34176
stack.watch emails you whenever new vulnerabilities are published in Netgate Pfsense Ce or Netgate Pfsense Plus. Just hit a watch button to start following.
Affected Versions
Netgate pfSense CE Version 7.0.8_2 is affected by CVE-2025-34176Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.