Overview
Palo Alto Networks PAN-OS contains an external control of file name or path vulnerability. Successful exploitation enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.
https://security.paloaltonetworks.com/CVE-2025-0111 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0111
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-0111 |
| Vendor / Product | Palo Alto Networks — PAN-OS |
| NVD Published | 2025-02-12 |
| NVD Last Modified | 2025-11-04 |
| CVSS 3.1 Score | 6.5 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Severity | MEDIUM |
| CWE | CWE-73 |
| CISA KEV Added | 2025-02-20 |
| CISA KEV Deadline | 2025-03-13 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Required Action
CISA BOD 22-01 Deadline: 2025-03-13.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-02-20 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-03-13 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-0111 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |