CVE-2025-0133

Published May 14, 2025

Last updated 3 months ago

CVSS medium 6.9
GlobalProtect

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-0133 is a reflected cross-site scripting (XSS) vulnerability found in the GlobalProtect gateway and portal features of Palo Alto Networks PAN-OS software. This vulnerability allows for the execution of malicious JavaScript within the browser of an authenticated Captive Portal user when they interact with a specially crafted link. The primary risk associated with this vulnerability is the potential for phishing attacks that could lead to the theft of user credentials, particularly if Clientless VPN is enabled. An attacker could create links that appear to be hosted on the GlobalProtect portal to steal credentials. Threat IDs 510003 and 510004 can be enabled to block attacks. Disabling Clientless VPN can also serve as mitigation.

Description
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.
Source
psirt@paloaltonetworks.com
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
6.9
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Amber
Severity
MEDIUM

Weaknesses

psirt@paloaltonetworks.com
CWE-79

Social media

Hype score
Not currently trending
  1. Has anyone received a bounty for this Reflected XSS on the GlobalProtect portal (CVE-2025-0133)

    @JoaoGomes12243

    16 Aug 2025

    526 Impressions

    0 Retweets

    5 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  2. I was awarded a $350 bounty on @Hacker0x01! https://t.co/5dbKBrWp1S #TogetherWeHitHarder Tip: CVE-2025-0133 RXSS https://t.co/21A0MTquqH

    @exploit_msf

    6 Aug 2025

    2239 Impressions

    4 Retweets

    120 Likes

    10 Bookmarks

    1 Reply

    0 Quotes

  3. 🚨 #CVE-2025-0133: Exploiting XSS Vulnerabilities with Payloads & Templates https://t.co/panlc5THPp Educational Purposes!

    @UndercodeUpdate

    4 Aug 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨CVE-2025-0133 : Payload + Template Payload: %3Csvg%20xmlns%3D%22http%3A%2F%https://t.co/W0HAJbMN6c%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E Write-up: https://t.co/jq2cek2iRc Template: https://t.co/NhyJZ0CaGd

    @0x3mrj

    4 Aug 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Post 2/100 CVE-2025-0133 : Payload + Template Payload: %3Csvg%20xmlns%3D%22http%3A%2F%https://t.co/l9uRav4jue%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E Write-up: https://t.co/nZzhUUmsIS Template: https://t.co/WOcSN2ImWz ---- Check About h

    @h4x0r_fr34k

    26 Jul 2025

    7936 Impressions

    35 Retweets

    202 Likes

    157 Bookmarks

    6 Replies

    0 Quotes

  6. CVE-2025-0133 — Reflected Cross-Site Scripting (XSS) in Palo Alto GlobalProtect VPN Portal https://t.co/PnkxJiZ9d0 #bugbounty #bugbountytips #bugbountytip

    @bountywriteups

    25 Jun 2025

    33 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. CVE-2025-0133 was announced (and fixed) last month, but now we can actually tell people how @XBOW discovered it! It showcases one reason LLMs excel at offsec – they've memorized details about ~every piece of software out there and can use that to find more attack surface https:

    @moyix

    24 Jun 2025

    1257 Impressions

    0 Retweets

    16 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  8. FacebookBacktracking to one you shouldn’t have skipped. ⚠️ So CVE-2025-0133 landed, and it doesn’t take much to mess things up. If you missed this one, Casey and Von explain what's going on: https://t.co/fSGml167yO

    @Bugcrowd

    23 Jun 2025

    2428 Impressions

    2 Retweets

    17 Likes

    8 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 Automating Bug Bounty Success: Leveraging Automation for #CVE-2025-0133 and Beyond https://t.co/IY9PsS2kHV Educational Purposes!

    @UndercodeUpdate

    22 Jun 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Found a real-world XSS bug (CVE-2025-0133) Dropped a write-up with full PoC + how to find similar targets Read here: https://t.co/cgpXENBdbm #BugBounty #XSS #CVE20250133 #CyberTamarin #EthicalHacking #CyberSecurity

    @Twinson_333

    20 Jun 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🚨 Exploiting and Mitigating the GlobalProtect XSS Vulnerability (#CVE-2025-0133) https://t.co/L5kv38SchF Educational Purposes!

    @UndercodeUpdate

    19 Jun 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. #BugBounty Reported only 90 CVE-2025-0133 2 - Pending Program Review 1 - Triaged 2 - rewarded $700(+$100$ retest) + $100 85 - Duplicates https://t.co/a4w3vfnEpy

    @crypt0grapherr

    19 Jun 2025

    9038 Impressions

    4 Retweets

    161 Likes

    47 Bookmarks

    7 Replies

    0 Quotes

  13. 🚨 Security Flash: CVE-2025-0133 Bugcrowd Founder @caseyjohnellis and Sr. Manager of Security Operations Von T. discuss the situation in depth. You’ll find the full video right here: https://t.co/fSGml167yO https://t.co/YYmQng169F

    @Bugcrowd

    18 Jun 2025

    1781 Impressions

    1 Retweet

    4 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. GlobalProtect XSS vuln (CVE-2025-0133) https://t.co/4U8CLVH7mF

    @phisher305

    18 Jun 2025

    3053 Impressions

    0 Retweets

    30 Likes

    8 Bookmarks

    0 Replies

    0 Quotes

  15. Has CVE-2025-0133 been reported by anyone, and was it accepted by any bug bounty platforms?

    @roohaa_n

    17 Jun 2025

    5326 Impressions

    1 Retweet

    37 Likes

    14 Bookmarks

    9 Replies

    0 Quotes

  16. The recently disclosed GlobalProtect XSS vuln (CVE-2025-0133) affects hundreds of thousands of organizations worldwide — including thousands of bug bounty programs. Try your luck by running this PoC 👇 #BugBounty #XSS #PoC https://t.co/Wtrw2el4ZQ

    @nav1n0x

    17 Jun 2025

    31569 Impressions

    51 Retweets

    396 Likes

    320 Bookmarks

    6 Replies

    0 Quotes

  17. 🚨 CVE-2025-0133 – Reflected XSS in PAN-OS Affects Palo Alto firewalls. Issued just 6 days ago. Nuclei detection template is now live ⚡️ #xss #infosec #security #bugbounty #paloalto https://t.co/zPm4VnrBV7

    @pdnuclei

    14 Jun 2025

    7673 Impressions

    5 Retweets

    69 Likes

    32 Bookmarks

    1 Reply

    1 Quote

  18. 🚨 CVE-2025-0133 - medium 🚨 PAN-OS - Reflected Cross-Site Scripting > A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway an... 👾 https://t.co/pk8n5FJa8K @pdnuclei #NucleiTemplates #cve

    @pdnuclei_bot

    13 Jun 2025

    145 Impressions

    0 Retweets

    0 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  19. Palo Alto NetworksのPAN-OSの脆弱性(CVE-2025-0133)が修正-PoCエクスプロイトも確認 #セキュリティ対策Lab #セキュリティ #Security https://t.co/WvsoBeTYOS

    @securityLab_jp

    22 May 2025

    21 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 🚨Alert🚨 CVE-2025-0133: A Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal 📊 3.0M+Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/LuDWP1ur5y 👇Query HUNTER : https://t.co/q9rtuGgxk7="PAN-OS" SH

    @HunterMapping

    22 May 2025

    3998 Impressions

    25 Retweets

    77 Likes

    29 Bookmarks

    1 Reply

    0 Quotes

  21. Palo Alto Networks discloses CVE-2025-0133, a reflected XSS vulnerability in GlobalProtect. Organizations urged to update PAN-OS and enhance user awareness. #CyberSecurity #PaloAlto #GlobalProtect #XSS https://t.co/o9MFvUXfcU

    @dailytechonx

    21 May 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. 🚨 Palo Alto GlobalProtect Vulnerability Enables Malicious Code Execution - PoC Released Read more: https://t.co/kmqVSCGqg8 Palo Alto Networks has disclosed a reflected cross-site scripting (XSS) vulnerability, tracked as CVE-2025-0133. #cybersecuritynews #vulnerability

    @gbhackers_news

    21 May 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. CVE-2025-0133 Reflected Cross-Site Scripting Vulnerability in Palo Alto Networks PAN-OS GlobalProtect https://t.co/ekC4HMAQSo

    @VulmonFeeds

    15 May 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

References

Sources include official advisories and independent security research.