CVE-2026-0256
Description
A stored cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS® software enables a malicious authenticated administrator to store a JavaScript payload using the web interface.
This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).
Cloud NGFW and Prisma® Access are not impacted by this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in PAN-OS web interface lets authenticated admins inject JavaScript, enabling malicious actions.
Vulnerability
Overview A stored cross-site scripting (XSS) vulnerability exists in the Palo Alto Networks PAN-OS web interface. An authenticated administrator with administrative privileges can store a malicious JavaScript payload via the web interface, which will be executed when the affected page is loaded by other users [1]. The root cause is insufficient sanitization of user-supplied input stored in the interface.
Attack
Vector Exploitation requires an authenticated administrator account on a vulnerable PAN-OS instance. No special configuration is needed; the attacker simply injects the payload through the web interface. The vulnerability affects PAN-OS running on PA-Series and VM-Series firewalls, as well as Panorama (virtual and M-Series). Cloud NGFW and Prisma Access are not impacted [1].
Impact
A successful attack allows the malicious administrator to execute arbitrary JavaScript in the context of other administrators' sessions. This could lead to session hijacking, data exfiltration, or further compromise of the firewall management interface. No malicious exploitation has been reported as of the advisory [1].
Mitigations
Palo Alto Networks has released Threat Prevention content update (Threat ID 510020) starting from Applications and Threats version 9100-10044 to detect and block attacks. Customers with a Threat Prevention subscription should enable this ID. There are no workarounds other than applying the threat prevention update or ensuring access to the web interface is restricted to trusted administrators [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.