Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0108 PoC — PAN-OS: Authentication Bypass in the Management Web Interface

Source
Associated Vulnerability
Title:PAN-OS: Authentication Bypass in the Management Web Interface (CVE-2025-0108)
Description:An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Description
CVE-2025-0108
Readme
# CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface 🔥

# Description:

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

# Metrics: 

CVSS 4.0 Severity and Vector Strings:

CNA:  Palo Alto Networks, Inc. CVSS-B 8.8 HIGH 🔴 Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Red

CVSS 3.x Severity and Vector Strings:

NIST: NVD Base Score: 9.1 CRITICAL ⚫ Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N


# Features:

+ Single URL Scanning: Check a single URL for vulnerability.
+ Batch URL Scanning: Check multiple URLs from a text file.
+ Logging: Logs results to both the console and a log file (scan_results.log).
+ Timeout Handling: Prevents the script from hanging indefinitely with the timeout parameter for HTTP requests.
+ Detailed Reporting: Outputs detailed information including status codes and responses.
+ Error Handling: Handles connection issues, timeouts, and other exceptions gracefully.

# Requirements:

+ Python 3.x
+ Requests library (pip install requests)

# 🛠️ Nuclei Usage:

```
sudo nuclei -t CVE-2025-0108.yaml -u <target-url>
```

# Usage:

```
sudo python3 CVE-2025-0108.py -u http://example.com
```

```
sudo python3 CVE-2025-0108.py -f urls.txt
```

# Disclaimer ⚠️

For educational and research purposes only. Use only against systems you own or have permission to test...
File Snapshot

[4.0K] /data/pocs/2d8b6793e32ac959a46c048de7b2284b0e0ef441 ├── [2.8K] CVE-2025-0108.py ├── [ 856] CVE-2025-0108.yaml └── [2.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →