An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.
The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW and all Prisma® Access instances.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2025-0125 |
Configurations
No configuration.
History
11 Apr 2025, 15:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Apr 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-11 02:15
Updated : 2025-04-11 15:39
NVD link : CVE-2025-0125
Mitre link : CVE-2025-0125
CVE.ORG link : CVE-2025-0125
JSON object : View
Products Affected
No product.
CWE
CWE-83
Improper Neutralization of Script in Attributes in a Web Page