CVE-2025-0105
Published: 11 January 2025
Summary
CVE-2025-0105 is a critical-severity External Control of File Name or Path (CWE-73) vulnerability in Paloaltonetworks Expedition. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked in the top 11.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the arbitrary file deletion vulnerability by validating inputs to prevent path traversal or external control of file paths as in CWE-73.
Enforces logical access controls to block unauthenticated attackers from performing unauthorized file deletion operations on the host filesystem.
Limits the impact of exploitation by restricting the www-data process to least privilege, preventing deletion of critical files outside its minimal required scope.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file deletion vulnerability directly enables T1070.004 (File Deletion) for indicator removal and T1485 (Data Destruction) for integrity/availability impact.
NVD Description
An arbitrary file deletion vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem.
Deeper analysisAI
CVE-2025-0105 is an arbitrary file deletion vulnerability in Palo Alto Networks Expedition. Published on 2025-01-11, it enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem. The issue carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and maps to CWE-73.
An unauthenticated attacker (PR:N) with network access (AV:N) to a vulnerable Expedition instance can exploit this flaw with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation allows deletion of files writable by the www-data user, resulting in high integrity (I:H) and availability (A:H) impacts with no confidentiality impact (C:N) and unchanged scope (S:U).
Mitigation details are provided in Palo Alto Networks security advisory PAN-SA-2025-0001, available at https://security.paloaltonetworks.com/PAN-SA-2025-0001.
Details
- CWE(s)