# CVE-2025-0133 Reflected XSS Detection Tool
**Author**: Derek Odiorne
**Date**: 2025-05-23
**Severity**: Medium
**Tested Against**: Palo Alto Networks GlobalProtect Portal (PAN-OS)
---
## 📌 Summary
This script performs **safe, authorized testing** for the vulnerability **CVE-2025-0133**, a reflected Cross-Site Scripting (XSS) issue in the **GlobalProtect portal and gateway login pages** of Palo Alto Networks' PAN-OS software.
The tool tests multiple common parameters with two context-specific payloads:
- **HTML context** (`<script>alert()</script>`)
- **JavaScript string context** (`j\";-alert()...`)
The results are colorized for clarity and saved in a timestamped log file.
---
## 🚨 Vulnerability Overview
- **CVE ID**: [CVE-2025-0133](https://security.paloaltonetworks.com/CVE-2025-0133)
- **Component**: PAN-OS (GlobalProtect Portal / Gateway)
- **Vulnerability**: Reflected XSS
- **Impact**: JavaScript execution in the context of an authenticated user
- **Exploit Method**: Maliciously crafted query parameter in a login URL
---
## 🧪 Usage
### Prerequisites
- Python 3.x
- `requests`
- `colorama`
Install dependencies (if needed):
```bash
pip install requests colorama
[4.0K] /data/pocs/9983334beaf971a6a6b694134b1d540b07ee583d
├── [3.8K] cve-2025-0133.py
├── [ 34K] LICENSE
└── [1.2K] README.md
0 directories, 3 files