CVE-2025-34174: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Netgate pfSense CE
In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being directly displayed in the input box. This value can be saved as the default value to be displayed to all users when visiting the Status Traffic Totals page, resulting in stored cross-site scripting. The attacker must be authenticated with at least "WebCfg - Status: Traffic Totals" permissions.
AI Analysis
Technical Summary
CVE-2025-34174 is a stored Cross-Site Scripting (XSS) vulnerability identified in the pfSense Community Edition (CE) version 2.3.2_7, specifically within the /usr/local/www/status_traffic_totals.php page. The vulnerability arises because the 'start-day' parameter is not properly validated or sanitized before being rendered in an input box on the Status Traffic Totals page. This parameter can be manipulated to include malicious HTML or JavaScript code, which is then stored and displayed to all users who access this page. The flaw is classified under CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires the attacker to be authenticated with at least "WebCfg - Status: Traffic Totals" permissions, meaning the attacker must have some level of legitimate access to the pfSense web interface. The CVSS v4.0 base score is 5.1, reflecting a medium severity level. The attack vector is network-based with low attack complexity and no privileges required beyond the specified permission level. User interaction is required for the malicious script to execute (i.e., a user must visit the affected page). The vulnerability impacts confidentiality partially (due to potential session hijacking or data theft via XSS), but does not affect integrity or availability directly. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an authenticated attacker to execute arbitrary scripts in the context of other users’ browsers, potentially leading to session hijacking, credential theft, or other malicious activities within the pfSense management interface.
Potential Impact
For European organizations using pfSense CE 2.3.2_7, this vulnerability poses a moderate risk primarily to network security management. Since pfSense is widely used as a firewall and routing platform in many enterprise and governmental networks, exploitation could allow attackers with limited authenticated access to escalate their privileges or compromise administrative sessions. This could lead to unauthorized disclosure of sensitive network configuration data or allow attackers to manipulate firewall rules indirectly by hijacking sessions or injecting malicious scripts. The impact is particularly significant for organizations relying on pfSense for perimeter defense, VPN gateways, or traffic monitoring, as compromise could undermine network integrity and confidentiality. Additionally, stored XSS vulnerabilities can facilitate lateral movement within internal networks if attackers leverage compromised credentials or sessions. The requirement for authenticated access limits exposure to insider threats or attackers who have already breached initial defenses, but the risk remains notable given the critical role of pfSense in network infrastructure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Status Traffic Totals page to only highly trusted administrators and monitoring for unusual activity or unauthorized changes. 2. Organizations should upgrade pfSense CE to a version where this vulnerability is patched once available; if no patch exists, consider applying custom input validation or sanitization on the 'start-day' parameter via web server rules or reverse proxy filters. 3. Implement strict role-based access control (RBAC) to minimize the number of users with the 'WebCfg - Status: Traffic Totals' permission. 4. Enable Content Security Policy (CSP) headers on the pfSense web interface to reduce the impact of XSS by restricting script execution sources. 5. Conduct regular security audits and penetration testing focused on the pfSense management interface to detect similar vulnerabilities. 6. Educate administrators about the risks of stored XSS and encourage cautious behavior when interacting with web interface inputs. 7. Monitor pfSense logs for suspicious input patterns or repeated access to the vulnerable page that might indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-34174: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Netgate pfSense CE
Description
In pfSense CE /usr/local/www/status_traffic_totals.php, the value of the start-day parameter is not ensured to be a numeric value or sanitized of HTML-related characters/strings before being directly displayed in the input box. This value can be saved as the default value to be displayed to all users when visiting the Status Traffic Totals page, resulting in stored cross-site scripting. The attacker must be authenticated with at least "WebCfg - Status: Traffic Totals" permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-34174 is a stored Cross-Site Scripting (XSS) vulnerability identified in the pfSense Community Edition (CE) version 2.3.2_7, specifically within the /usr/local/www/status_traffic_totals.php page. The vulnerability arises because the 'start-day' parameter is not properly validated or sanitized before being rendered in an input box on the Status Traffic Totals page. This parameter can be manipulated to include malicious HTML or JavaScript code, which is then stored and displayed to all users who access this page. The flaw is classified under CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires the attacker to be authenticated with at least "WebCfg - Status: Traffic Totals" permissions, meaning the attacker must have some level of legitimate access to the pfSense web interface. The CVSS v4.0 base score is 5.1, reflecting a medium severity level. The attack vector is network-based with low attack complexity and no privileges required beyond the specified permission level. User interaction is required for the malicious script to execute (i.e., a user must visit the affected page). The vulnerability impacts confidentiality partially (due to potential session hijacking or data theft via XSS), but does not affect integrity or availability directly. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an authenticated attacker to execute arbitrary scripts in the context of other users’ browsers, potentially leading to session hijacking, credential theft, or other malicious activities within the pfSense management interface.
Potential Impact
For European organizations using pfSense CE 2.3.2_7, this vulnerability poses a moderate risk primarily to network security management. Since pfSense is widely used as a firewall and routing platform in many enterprise and governmental networks, exploitation could allow attackers with limited authenticated access to escalate their privileges or compromise administrative sessions. This could lead to unauthorized disclosure of sensitive network configuration data or allow attackers to manipulate firewall rules indirectly by hijacking sessions or injecting malicious scripts. The impact is particularly significant for organizations relying on pfSense for perimeter defense, VPN gateways, or traffic monitoring, as compromise could undermine network integrity and confidentiality. Additionally, stored XSS vulnerabilities can facilitate lateral movement within internal networks if attackers leverage compromised credentials or sessions. The requirement for authenticated access limits exposure to insider threats or attackers who have already breached initial defenses, but the risk remains notable given the critical role of pfSense in network infrastructure.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Status Traffic Totals page to only highly trusted administrators and monitoring for unusual activity or unauthorized changes. 2. Organizations should upgrade pfSense CE to a version where this vulnerability is patched once available; if no patch exists, consider applying custom input validation or sanitization on the 'start-day' parameter via web server rules or reverse proxy filters. 3. Implement strict role-based access control (RBAC) to minimize the number of users with the 'WebCfg - Status: Traffic Totals' permission. 4. Enable Content Security Policy (CSP) headers on the pfSense web interface to reduce the impact of XSS by restricting script execution sources. 5. Conduct regular security audits and penetration testing focused on the pfSense management interface to detect similar vulnerabilities. 6. Educate administrators about the risks of stored XSS and encourage cautious behavior when interacting with web interface inputs. 7. Monitor pfSense logs for suspicious input patterns or repeated access to the vulnerable page that might indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c089dc075fc5f733c91a2f
Added to database: 9/9/2025, 8:11:08 PM
Last enriched: 9/24/2025, 1:08:29 AM
Last updated: 10/30/2025, 6:48:15 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumCVE-2025-10636: CWE-79 Cross-Site Scripting (XSS) in NS Maintenance Mode for WP
HighData Leak Outs Students of Iran's MOIS Training Academy
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.