Skip to main content

CVE-2025-53392: CWE-36 Absolute Path Traversal in Netgate pfSense

Medium
VulnerabilityCVE-2025-53392cvecve-2025-53392cwe-36
Published: Sat Jun 28 2025 (06/28/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Netgate
Product: pfSense

Description

In Netgate pfSense CE 2.8.0, the "WebCfg - Diagnostics: Command" privilege allows reading arbitrary files via diag_command.php dlPath directory traversal. NOTE: the Supplier's perspective is that this is intended behavior for this privilege level, and that system administrators are informed through both the product documentation and UI.

AI-Powered Analysis

AILast updated: 06/28/2025, 22:54:27 UTC

Technical Analysis

CVE-2025-53392 describes an absolute path traversal vulnerability (CWE-36) in Netgate pfSense Community Edition version 2.8.0. The vulnerability exists in the web interface component "WebCfg - Diagnostics: Command" functionality, specifically in the diag_command.php script. Users with the "Command" privilege can exploit the dlPath parameter to perform directory traversal attacks, allowing them to read arbitrary files on the underlying system. This means that by manipulating the dlPath input, an attacker with this privilege can access files outside the intended directory scope, potentially exposing sensitive system files or configuration data. However, the vendor (Netgate) considers this behavior intentional for users with this privilege level, as system administrators are expected to have full visibility and control over the system. The vulnerability has a CVSS v3.1 base score of 5.0 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are reported in the wild as of the publication date (June 28, 2025).

Potential Impact

For European organizations using pfSense CE 2.8.0, this vulnerability could lead to unauthorized disclosure of sensitive files if an attacker gains the "Command" privilege on the web interface. Since this privilege is typically granted to trusted administrators, the risk primarily arises from insider threats or compromised administrator accounts. Exposure of configuration files or system data could facilitate further attacks, such as credential theft or network reconnaissance. The medium severity score reflects that while the vulnerability does not allow remote unauthenticated attackers to exploit it, it can be leveraged by attackers with some level of access. Given pfSense's widespread use in enterprise and governmental networks across Europe for firewalling and routing, exploitation could impact network security posture and confidentiality of internal data. However, the lack of integrity or availability impact limits the potential for disruption or system manipulation directly via this vulnerability.

Mitigation Recommendations

1. Restrict the assignment of the "WebCfg - Diagnostics: Command" privilege strictly to highly trusted administrators only, minimizing the attack surface. 2. Implement strong authentication mechanisms (e.g., multi-factor authentication) for all administrative accounts to reduce the risk of privilege compromise. 3. Monitor and audit usage of the diagnostics command interface to detect unusual or unauthorized file access attempts. 4. Consider network segmentation and access controls to limit administrative interface exposure to trusted management networks only. 5. If feasible, apply custom hardening or patches that restrict the dlPath parameter to safe directories or sanitize input to prevent directory traversal, even for privileged users. 6. Keep pfSense installations updated and monitor Netgate advisories for any future patches or changes in privilege handling related to this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68606f1d6f40f0eb727478ef

Added to database: 6/28/2025, 10:39:25 PM

Last enriched: 6/28/2025, 10:54:27 PM

Last updated: 7/12/2025, 12:52:38 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats