Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30868: CWE-352: Cross-Site Request Forgery (CSRF) in opnsense core

0
Medium
VulnerabilityCVE-2026-30868cvecve-2026-30868cwe-352
Published: Wed Mar 11 2026 (03/11/2026, 16:38:12 UTC)
Source: CVE Database V5
Vendor/Project: opnsense
Product: core

Description

OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, multiple OPNsense MVC API endpoints perform state‑changing operations but are accessible via HTTP GET requests without CSRF protection. The framework CSRF validation in ApiControllerBase only applies to POST/PUT/DELETE methods, allowing authenticated GET requests to bypass CSRF verification. As a result, a malicious website can trigger privileged backend actions when visited by an authenticated user, causing unintended service reloads and configuration changes through configd. This results in an authenticated Cross‑Site Request Forgery vulnerability allowing unauthorized system state changes. This vulnerability is fixed in 26.1.4.

AI-Powered Analysis

AILast updated: 03/11/2026, 17:15:39 UTC

Technical Analysis

OPNsense is a FreeBSD-based firewall and routing platform widely used for network security management. In versions prior to 26.1.4, multiple MVC API endpoints in OPNsense core perform critical state-changing operations via HTTP GET requests. The underlying framework's CSRF protection mechanism in ApiControllerBase only enforces validation on POST, PUT, and DELETE HTTP methods, leaving GET requests unprotected. Since these GET endpoints can modify system state, an attacker can craft malicious web pages that, when visited by an authenticated OPNsense user, cause unintended backend actions such as service reloads or configuration changes through the configd daemon. This constitutes an authenticated CSRF vulnerability (CWE-352) that compromises system integrity and availability by allowing unauthorized changes without user intent. The attack requires the victim to be authenticated and to visit a malicious website, but no additional user interaction beyond page visit is necessary. The vulnerability does not expose confidential data directly but can disrupt firewall operations or alter configurations, potentially weakening network defenses. The issue was publicly disclosed on March 11, 2026, and resolved in OPNsense version 26.1.4. No known exploits are reported in the wild at this time.

Potential Impact

The vulnerability allows attackers to perform unauthorized state-changing operations on OPNsense firewall devices by exploiting authenticated users. This can lead to unintended service reloads or configuration modifications, potentially disrupting network security policies and firewall behavior. Organizations relying on OPNsense for perimeter defense or internal segmentation may experience degraded security posture, increased risk of network exposure, or downtime. Although confidentiality is not directly impacted, the integrity and availability of firewall configurations and services are at risk. Attackers could leverage this to weaken firewall rules, disable protections, or cause service interruptions, which may facilitate further attacks or data breaches. The requirement for user authentication and user interaction (visiting a malicious site) limits the attack scope but does not eliminate risk, especially in environments with many users or where users frequently access external web content. The medium CVSS score reflects this balance of impact and exploit complexity.

Mitigation Recommendations

1. Upgrade all OPNsense core installations to version 26.1.4 or later, where this CSRF vulnerability is patched. 2. Review and restrict user access to the OPNsense web interface, enforcing the principle of least privilege to minimize the number of authenticated users exposed to potential CSRF attacks. 3. Implement network segmentation and firewall rules to limit administrative interface access to trusted networks or VPNs only, reducing exposure to malicious websites. 4. Educate users about the risks of visiting untrusted websites while authenticated to critical infrastructure management portals. 5. Consider deploying web application firewalls (WAFs) or reverse proxies that can detect and block suspicious HTTP GET requests that attempt state changes. 6. Monitor OPNsense logs for unusual configuration changes or service reloads that may indicate exploitation attempts. 7. If upgrading immediately is not feasible, temporarily disable or restrict access to vulnerable API endpoints or enforce additional CSRF protections via custom rules or plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:27:35.343Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b19f882f860ef9434a76c9

Added to database: 3/11/2026, 4:59:52 PM

Last enriched: 3/11/2026, 5:15:39 PM

Last updated: 3/14/2026, 2:29:48 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses