When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.
The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.
                
            CVSS
                No CVSS.
References
                    | Link | Resource | 
|---|---|
| https://security.paloaltonetworks.com/CVE-2025-0126 | 
Configurations
                    No configuration.
History
                    11 Apr 2025, 15:39
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
11 Apr 2025, 02:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-11 02:15
Updated : 2025-04-11 15:39
NVD link : CVE-2025-0126
Mitre link : CVE-2025-0126
CVE.ORG link : CVE-2025-0126
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
