An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.
The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2025-0137 |
Configurations
No configuration.
History
16 May 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 May 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 19:15
Updated : 2025-05-16 14:43
NVD link : CVE-2025-0137
Mitre link : CVE-2025-0137
CVE.ORG link : CVE-2025-0137
JSON object : View
Products Affected
No product.
CWE
CWE-83
Improper Neutralization of Script in Attributes in a Web Page