Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-0261— PAN-OS: Authenticated Admin Command Injection Vulnerability

AI Predicted 9.8 Difficulty: Easy EPSS 0.08% · P24

Affected Version Matrix 6

VendorProductVersion RangeStatus
Palo Alto NetworksCloud NGFWAllunaffected
Palo Alto NetworksPAN-OS12.1.0< 12.1.7, 12.1.4-h5affected
11.2.0< 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17affected
11.1.0< 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33affected
10.2.0< 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, 10.2.7-h34affected
Palo Alto NetworksPrisma AccessAllunaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-0261

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Authenticated Admin Command Injection Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple command injection vulnerabilities in Palo Alto Networks PAN-OS® software enable an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI or Web UI. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators and by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by these vulnerabilities.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在操作系统命令注入漏洞,该漏洞源于多个命令注入,可能导致经过身份验证的管理员绕过系统限制并以root用户身份运行任意命令。以下产品及版本受到影响:PA-Series和VM-Series防火墙以及Panorama虚拟和M-Series上的PAN-OS软件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPAN-OS 12.1.0 ~ 12.1.7, 12.1.4-h5 cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2026-0261

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-0261

登录查看更多情报信息。
Advisory · 1

Same Patch Batch · Palo Alto Networks · 2026-05-13 · 26 CVEs total

CVE-2026-0238Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
CVE-2026-0242Trust Protection Foundation: SQL Injection Vulnerability
CVE-2026-0258PAN-OS: Server-Side Request Forgery (SSRF) in IKEv2 Certificate URL Fetching
CVE-2026-0245Prisma Access Agent: Information Disclosure Vulnerabilities
CVE-2026-0259WildFire WF-500 and WF-500-B: Arbitrary File Read and Delete Vulnerability in WildFire App
CVE-2026-0236Prisma Browser: Code Injection Enables Security Controls Bypass
CVE-2026-0241Trust Protection Foundation: Multiple Authorization Bypass Vulnerabilities
CVE-2026-0265PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled
CVE-2026-0243Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through IPv6 Crafted Packet
CVE-2026-0262PAN-OS: Denial of Service Vulnerabilities in Network Traffic Parsing
CVE-2026-0237Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass
CVE-2026-0247Prisma Access Agent Endpoint DLP: Authorization Bypass Vulnerabilities
CVE-2026-0256PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
CVE-2026-0250GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway
CVE-2026-0264PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remo
CVE-2026-0235Prisma Browser: Access and Data Rule Bypass
CVE-2026-0251GlobalProtect App: Local Privilege Escalation Vulnerabilities
CVE-2026-0249GlobalProtect App: Certificate Validation Bypass Vulnerabilities
CVE-2026-0240Trust Protection Foundation: Sensitive Information Disclosure Vulnerability
CVE-2026-0244Prisma SD-WAN: Improper Certificate Validation Vulnerability

Showing top 20 of 26 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-0261

No comments yet


Leave a comment