// For flags

CVE-2025-0125

PAN-OS: Improper Neutralization of Input in the Management Web Interface

Severity Score

6.9
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator. The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW and all Prisma® Access instances.

*Credits: Visa Cybersecurity team, Deloitte Romania, represented by Razvan Ilisanu and Matei “Mal” Badanoiu,
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
Low
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
Low
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
High
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
Low
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-12-20 CVE Reserved
  • 2025-04-11 CVE Published
  • 2025-04-11 CVE Updated
  • 2025-04-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-83: Improper Neutralization of Script in Attributes in a Web Page
CAPEC
  • CAPEC-242: Code Injection
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Palo Alto Networks
Search vendor "Palo Alto Networks"
PAN-OS
Search vendor "Palo Alto Networks" for product "PAN-OS"
>= 11.2.0 < 11.2.5
Search vendor "Palo Alto Networks" for product "PAN-OS" and version " >= 11.2.0 < 11.2.5"
en
Affected
Palo Alto Networks
Search vendor "Palo Alto Networks"
PAN-OS
Search vendor "Palo Alto Networks" for product "PAN-OS"
>= 11.1.0 < 11.1.5
Search vendor "Palo Alto Networks" for product "PAN-OS" and version " >= 11.1.0 < 11.1.5"
en
Affected
Palo Alto Networks
Search vendor "Palo Alto Networks"
PAN-OS
Search vendor "Palo Alto Networks" for product "PAN-OS"
>= 11.0.0 < 11.0.6
Search vendor "Palo Alto Networks" for product "PAN-OS" and version " >= 11.0.0 < 11.0.6"
en
Affected
Palo Alto Networks
Search vendor "Palo Alto Networks"
PAN-OS
Search vendor "Palo Alto Networks" for product "PAN-OS"
>= 10.2.0 < 10.2.11
Search vendor "Palo Alto Networks" for product "PAN-OS" and version " >= 10.2.0 < 10.2.11"
en
Affected