An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.

The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.

Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 09 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 18:45:00 +0000

Type Values Removed Values Added
Description An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Title PAN-OS: Improper Neutralization of Input in the Management Web Interface
Weaknesses CWE-83
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-10-09T19:08:50.531Z

Reserved: 2025-05-12T22:05:13.606Z

Link: CVE-2025-4615

cve-icon Vulnrichment

Updated: 2025-10-09T19:08:46.934Z

cve-icon NVD

Status : Received

Published: 2025-10-09T19:15:43.490

Modified: 2025-10-09T19:15:43.490

Link: CVE-2025-4615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.