Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2025-0133 PoC — PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal

Source
Associated Vulnerability
Title:PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (CVE-2025-0133)
Description:A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
Readme
# CVE-2025-0133 Reflected XSS Detection Tool

**Author**: Derek Odiorne  
**Date**: 2025-05-23  
**Severity**: Medium  
**Tested Against**: Palo Alto Networks GlobalProtect Portal (PAN-OS)

---

## 📌 Summary

This script performs **safe, authorized testing** for the vulnerability **CVE-2025-0133**, a reflected Cross-Site Scripting (XSS) issue in the **GlobalProtect portal and gateway login pages** of Palo Alto Networks' PAN-OS software.

The tool tests multiple common parameters with two context-specific payloads:
- **HTML context** (`<script>alert()</script>`)
- **JavaScript string context** (`j\";-alert()...`)

The results are colorized for clarity and saved in a timestamped log file.

---

## 🚨 Vulnerability Overview

- **CVE ID**: [CVE-2025-0133](https://security.paloaltonetworks.com/CVE-2025-0133)
- **Component**: PAN-OS (GlobalProtect Portal / Gateway)
- **Vulnerability**: Reflected XSS
- **Impact**: JavaScript execution in the context of an authenticated user
- **Exploit Method**: Maliciously crafted query parameter in a login URL

---

## 🧪 Usage

### Prerequisites

- Python 3.x
- `requests`
- `colorama`

Install dependencies (if needed):

```bash
pip install requests colorama
File Snapshot

[4.0K] /data/pocs/9983334beaf971a6a6b694134b1d540b07ee583d ├── [3.8K] cve-2025-0133.py ├── [ 34K] LICENSE └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →