OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, the XMLRPC method opnsense.restore_config_section fails to sanitize user supplied input leading to Remote Code Execution. This vulnerability is fixed in 26.1.7.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opnsense
Opnsense core |
|
| Vendors & Products |
Opnsense
Opnsense core |
Wed, 13 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, the XMLRPC method opnsense.restore_config_section fails to sanitize user supplied input leading to Remote Code Execution. This vulnerability is fixed in 26.1.7. | |
| Title | OPNsense: RCE via XMLRPC endpoint using `opnsense.restore_config_section` method | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T21:52:04.150Z
Reserved: 2026-05-05T15:13:47.570Z
Link: CVE-2026-44193
No data.
Status : Received
Published: 2026-05-13T22:16:43.533
Modified: 2026-05-13T22:16:43.533
Link: CVE-2026-44193
No data.
OpenCVE Enrichment
Updated: 2026-05-13T23:30:06Z
Weaknesses