Home

Description

OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting crafted input to the mailserver parameter. Attackers can send POST requests to the monit interface with JavaScript payloads in the mailserver parameter to execute arbitrary code in users' browsers.

PUBLISHED Reserved 2026-02-15 | Published 2026-02-15 | Updated 2026-02-17 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

19.1
affected

Credits

Ozer Goker finder

References

www.exploit-db.com/exploits/46351 (ExploitDB-46351) exploit

opnsense.org (OPNsense Official Website) product

forum.opnsense.org/index.php?topic=11469.0 (OPNsense 19.1.1 Release Announcement) patch

www.vulncheck.com/...sense-reflected-xss-via-monit-interface (VulnCheck Advisory: OPNsense 19.1 Reflected XSS via monit interface) third-party-advisory

cve.org (CVE-2019-25375)

nvd.nist.gov (CVE-2019-25375)

Download JSON