Palo Alto Networks warns a reflected cross-site scripting (XSS) vulnerability, CVE-2025-0133, in the GlobalProtect gateway and portal features of its PAN-OS software. The flaw allows malicious JavaScript to run in the browsers of authenticated Captive Portal users when they click specific links.
Organizations using the Clientless VPN feature face a serious threat. While it has a low severity rating (CVSS Base Score 2.0) in default settings, the risk increases to MEDIUM (CVSS 5.5) when the Clientless VPN is active.
Security researchers have discovered a database with 184 million account credentials, highlighting the need to update compromised passwords, strengthen weak...
Palo Alto Networks warns a reflected cross-site scripting (XSS) vulnerability, CVE-2025-0133, in the GlobalProtect gateway and portal features of its...
Pwn2Own Berlin 2025, a top cybersecurity contest, awarded $1,078,750 to researchers who discovered 29 zero-day vulnerabilities in various enterprise technologies....
A recently discovered vulnerability, CVE-2025-22157, threatens organizations using Atlassian’s Jira Core Data Center and Jira Service Management Data Center by...
Billions of files, including documents, source code, and backups, are leaking because of misconfigured cloud storage. Cyble, a cybersecurity company...
Siemens issued a security advisory (SSA-047424) for two serious vulnerabilities—CVE-2025-26389 and CVE-2025-26390—impacting the OZW672 and OZW772 web servers. These servers...
This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect gateway or portal. Palo Alto Networks is not aware of any malicious exploitation of this issue.
Mitigation Strategies:
Organizations running vulnerable versions should implement one of several available mitigations:
Upgrade to patched versions when available:
PAN-OS 11.2: Version 11.2.7 or later (expected June 2025).
PAN-OS 11.1: Version 11.1.11 or later (expected July 2025).
PAN-OS 10.2: Version 10.2.17 or later (expected August 2025).
Enable Threat Prevention IDs 510003 and 510004 (introduced in Applications and Threats content version 8970) for customers with Threat Prevention subscriptions and consider disabling Clientless VPN functionality entirely.