A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.
The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2025-4231 |
![]() ![]() |
History
Fri, 13 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Jun 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability. | |
Title | PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface | |
First Time appeared |
Palo Alto Networks
Palo Alto Networks pan-os |
|
Weaknesses | CWE-77 | |
CPEs | cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Palo Alto Networks
Palo Alto Networks pan-os |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published: 2025-06-12T23:27:31.432Z
Updated: 2025-06-13T13:32:58.253Z
Reserved: 2025-05-02T19:10:44.240Z
Link: CVE-2025-4231

Updated: 2025-06-13T13:32:55.162Z

Status : Received
Published: 2025-06-13T00:15:23.533
Modified: 2025-06-13T00:15:23.533
Link: CVE-2025-4231

No data.