Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0108 PoC — PAN-OS: Authentication Bypass in the Management Web Interface

Source
Associated Vulnerability
Title:PAN-OS: Authentication Bypass in the Management Web Interface (CVE-2025-0108)
Description:An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Description
PAN-OS CVE POC SCRIPT
Readme
# CVE-2025-0108 - PAN-OS PoC SCRIPT /!\

> **Disclaimer:** This script is provided 'as is' and exclusively for educational purposes. Users are strongly advised to exercise caution and utilize it within the boundaries of legal and ethical considerations.

## Description
Python vulnerability scanner designed to check for **CVE-2025-0108**, an authentication bypass vulnerability in **Palo Alto Networks' PAN-OS**.
The tool works by sending specially crafted HTTP requests to URLs or a list of URLs to detect if they are vulnerable to the CVE-2025-0108 flaw. 
This vulnerability could allow an unauthenticated threat actor to bypass authentication on a vulnerable system.

## Features

- **Single URL Scanning**: Check a single URL for vulnerability.
- **Batch URL Scanning**: Check multiple URLs from a text file.
- **Logging**: Logs results to both the console and a log file (`scan_results.log`).
- **Timeout Handling**: Prevents the script from hanging indefinitely with the `timeout` parameter for HTTP requests.
- **Detailed Reporting**: Outputs detailed information including status codes and responses.
- **Error Handling**: Handles connection issues, timeouts, and other exceptions gracefully.

## Requirements
- Python 3.x
- Requests library (`pip install requests`)

## Usage
```bash
python script.py -u http://example.com
```
```bash
python script.py -f urls.txt
```

## About
[![made-with-python](https://img.shields.io/badge/Made%20with-Python-blue.svg)](https://www.python.org/) 
[![Python 3.x](https://img.shields.io/badge/Python-3.x-blue.svg)](https://www.python.org/downloads/release/python-360/)
[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)
[![email-contact](https://img.shields.io/badge/info@cybersec.sohaib.eu-blue.svg)](mailto:info@cybersec.sohaib.eu) 
File Snapshot

[4.0K] /data/pocs/a2382ecfda739b2809e14aa7da14fb68c319b01c ├── [3.3K] CVE_2025_0108_V1.py ├── [ 34K] LICENSE └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →