Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0133— PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal

EPSS 1.84% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-0133

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal
Source: NVD (National Vulnerability Database)
Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞,该漏洞源于反射型跨站脚本可能导致钓鱼攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksCloud NGFW All ~ 11.2.8 -
Palo Alto NetworksPAN-OS 11.2.0 ~ 11.2.7 cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*
Palo Alto NetworksPrisma Access All -

II. Public POCs for CVE-2025-0133

#POC DescriptionSource LinkShenlong Link
1A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yamlPOC Details
2Nonehttps://github.com/dodiorne/cve-2025-0133POC Details
3 CVE-2025-0133 GlobalProtect XSShttps://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSSPOC Details
4Palo Alto - Global Protect - Reflected XSShttps://github.com/wiseep/CVE-2025-0133POC Details
5Reflected XSS vulnerability found in Palo Alto GlobalProtect Gateway & Portal. Attackers can inject malicious scripts via crafted requests. https://github.com/INTELEON404/CVE-2025-0133POC Details
6Nonehttps://github.com/shawarkhanethicalhacker/CVE-2025-0133-exploitPOC Details
7CVE-2025-0133 Exploithttps://github.com/adhamelhansye/CVE-2025-0133POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-0133

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2025-05-14 · 8 CVEs total

CVE-2025-0130PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Malicious
CVE-2025-0132Cortex XDR Broker VM: Unauthenticated User Can Disable Internal Services
CVE-2025-0134Cortex XDR Broker VM: Authenticated Code Injection Vulnerability in Broker VM
CVE-2025-0135GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App
CVE-2025-0137PAN-OS: Improper Neutralization of Input in the Management Web Interface
CVE-2025-0138Prisma Cloud Compute Edition: Insufficient Session Expiration Vulnerability in the Web Int
CVE-2025-0136PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices

IV. Related Vulnerabilities

V. Comments for CVE-2025-0133

Anonymous User
2026-03-30 17:03:41

Український сегмент мережі Інтернет зустрів свіжий тематичний проєкт — <a href=https://lscatin.icu/>навігатор по сайтам</a>, покликаний об'єднати різнопланові веб-ресурси країни. Зазначений ресурс містить гіперпосилання на джерела, що висвітлюють чимало різних напрямків. Каталог включає ресурси як загальнонаціонального рівня, так і ті, що спеціалізуються на житті окремих регіонів та міст. Головне завдання проєкту — стати універсальним провідником для відвідувачів, які потребують перевірені українські джерела інформації на будь-який смак: починаючи від оперативних зведень і політикуму до глибоких історичних досліджень, молодіжних питань, лайфстайлу, правозахисної тематики та публіцистики. Каталог орієнтований на широку аудиторію та відкритий до співпраці з медіа, працівниками пера та рекламодавцями, які бажають заявити про себе в українському інформаційному полі


Leave a comment