Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-0133 PoC — PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal

Source
Associated Vulnerability
Title:PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (CVE-2025-0133)
Description:A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
Description
CVE-2025-0133 Exploit
Readme
# CVE-2025-0133
CVE-2025-0133 Exploit
CVE-2025-0133 is a reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software. An authenticated user with access to the Captive Portal can be tricked into clicking a specially crafted link, leading to the execution of arbitrary JavaScript in the context of their browser. This could result in session hijacking, credential theft, or other client-side attacks.

Severity: Medium (CVSS v3.1 Base Score: 6.1; Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
Affected Versions:

PAN-OS 11.2 < 11.2.7
PAN-OS 11.1 < 11.1.11
PAN-OS 10.2 < 10.2.17


Published: May 14, 2025
Vendor Advisory: Palo Alto Networks Security Advisory
NVD Entry: CVE-2025-0133

Impact:

Execution of malicious JavaScript in the victim's browser.
Potential for phishing, data exfiltration, or further exploitation if combined with other vulnerabilities.
Limited impact on confidentiality for Clientless VPN users due to inherent risks (see PAN-SA-2025-0005).
File Snapshot

[4.0K] /data/pocs/d351046d25c94033736c162112f02ff35e34e903 ├── [ 878] POC.txt └── [1.0K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →