An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.

History

Fri, 23 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks expedition
CPEs cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks expedition
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 15 Jan 2025 22:30:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software. An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Green'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Green'}


Mon, 13 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Jan 2025 03:15:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
Title Expedition: OS Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Green'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-01-24T04:56:01.054Z

Reserved: 2024-12-20T23:23:09.397Z

Link: CVE-2025-0107

cve-icon Vulnrichment

Updated: 2025-01-13T19:47:37.177Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-11T03:15:22.637

Modified: 2026-01-23T21:50:52.630

Link: CVE-2025-0107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses