Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0108 PoC — PAN-OS: Authentication Bypass in the Management Web Interface

Source
Associated Vulnerability
Title:PAN-OS: Authentication Bypass in the Management Web Interface (CVE-2025-0108)
Description:An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Description
This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.
Readme
# CVE-2025-0108 Proof of Concept (PoC)

This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.

![image](https://github.com/user-attachments/assets/3f3f6868-7f71-428e-9a12-3c53a1ed437f)

# CVE-2025-0108 Detection Template 🔍

**Nuclei template for Palo Alto PAN-OS Authentication Bypass (CVE-2025-0108)**

## 📜 Overview
A detection template for an authentication bypass vulnerability in Palo Alto PAN-OS management interface that allows unauthorized access via crafted path traversal requests.

**CVSS 4.0**: 8.8 (Base) / 7.8 (Threat)  
**Severity**: High  

## 🛠️ Nuclei Usage
```bash
nuclei -t CVE-2025-0108.yaml -u <target-url> 
File Snapshot

[4.0K] /data/pocs/719b00062359a01ba5fbf8daf0b377a8d3d3e79a ├── [ 886] CVE-2025-0108.yaml ├── [1.0K] LICENSE └── [ 872] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →