CVE-2025-0107
Published: 11 January 2025
Summary
CVE-2025-0107 is a critical-severity OS Command Injection (CWE-78) vulnerability in Paloaltonetworks Expedition. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates OS command injection (CWE-78) by requiring validation of all information inputs to prevent arbitrary command execution.
Ensures timely identification, reporting, and remediation of flaws like CVE-2025-0107 through patching as advised in PAN-SA-2025-0001.
Enforces least privilege on the www-data user account to limit the scope of damage from injected commands and prevent disclosure of sensitive data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated OS command injection in a public-facing management application enables remote code execution via Unix shell.
NVD Description
An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys…
more
for firewalls running PAN-OS software.
Deeper analysisAI
CVE-2025-0107 is an OS command injection vulnerability (CWE-78) in Palo Alto Networks Expedition. The vulnerability affects the Expedition software and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). It was published on 2025-01-11.
An unauthenticated attacker can exploit the vulnerability over the network with low complexity and no privileges to execute arbitrary OS commands as the www-data user in Expedition. Successful exploitation results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
Palo Alto Networks has published security advisory PAN-SA-2025-0001 with details on mitigations and patches, available at https://security.paloaltonetworks.com/PAN-SA-2025-0001.
Details
- CWE(s)