An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
References
| Link | Resource |
|---|---|
| https://security.paloaltonetworks.com/PAN-SA-2025-0001 | Vendor Advisory |
Configurations
History
23 Jan 2026, 21:50
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://security.paloaltonetworks.com/PAN-SA-2025-0001 - Vendor Advisory | |
| CPE | cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:* | |
| First Time |
Paloaltonetworks
Paloaltonetworks expedition |
15 Jan 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| Summary | (en) An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software. |
11 Jan 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-11 03:15
Updated : 2026-01-23 21:50
NVD link : CVE-2025-0107
Mitre link : CVE-2025-0107
CVE.ORG link : CVE-2025-0107
JSON object : View
Products Affected
paloaltonetworks
- expedition
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
