CVE-2026-44194

Published May 13, 2026

Last updated 5 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2026-44194 is an authenticated Remote Code Execution (RCE) vulnerability affecting OPNsense, a FreeBSD-based firewall and routing platform, in versions prior to 26.1.8. This flaw allows a user with user-management privileges to execute arbitrary system commands as root. The vulnerability stems from a bypass of input validation within the local user synchronization flow, specifically in the `core/src/opnsense/scripts/auth/sync_user.php` script. An attacker can craft a malicious payload disguised as a compliant email address, which then enables the execution of shell commands on the underlying operating system. The issue is resolved in OPNsense version 26.1.8.

Description
OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.8, an authenticated Remote Code Execution (RCE) vulnerability in the OPNsense core allows a user with user-management privileges to execute arbitrary system commands as root. An attacker can bypass input validation by formatting their malicious payload as a compliant email address, allowing shell commands to reach the underlying operating system. The flaw exists in the local user synchronization flow, within core/src/opnsense/scripts/auth/sync_user.php. This vulnerability is fixed in 26.1.8.
Source
security-advisories@github.com
NVD status
Analyzed
Products
opnsense

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.1
Impact score
6
Exploitability score
2.3
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-78

Social media

Hype score
Not currently trending

Configurations