A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.

The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.

Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18223 A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Fixes

Solution

Version Minor Version Suggested Solution PAN-OS 11.2 No action needed.PAN-OS 11.1 No action needed. PAN-OS 11.0* 11.0.0 through 11.0.2 Upgrade to 11.0.3 or later. PAN-OS 10.2 10.2.0 through 10.2.7 Upgrade to 10.2.8 or later. PAN-OS 10.1Upgrade to 10.2.8 or 11.0.3 or later.All older unsupported PAN-OS versions Upgrade to a supported fixed version. *PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.


Workaround

Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices

History

Wed, 22 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks pan-os
CPEs cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks pan-os
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00365}

epss

{'score': 0.00355}


Fri, 13 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 23:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Title PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface
First Time appeared Palo Alto Networks
Palo Alto Networks pan-os
Weaknesses CWE-77
CPEs cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*
Vendors & Products Palo Alto Networks
Palo Alto Networks pan-os
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-06-13T13:32:58.253Z

Reserved: 2025-05-02T19:10:44.240Z

Link: CVE-2025-4231

cve-icon Vulnrichment

Updated: 2025-06-13T13:32:55.162Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-13T00:15:23.533

Modified: 2025-10-22T12:57:48.007

Link: CVE-2025-4231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.