🔐 CVE Alert

CVE-2026-0261

UNKNOWN 0.0

PAN-OS: Authenticated Admin Command Injection Vulnerability

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Multiple command injection vulnerabilities in Palo Alto Networks PAN-OS® software enable an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI or Web UI. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators and by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by these vulnerabilities.

CWE CWE-78
Vendor palo alto networks
Product cloud ngfw
Published May 13, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for palo alto networks cloud ngfw

Be the first to know when new unknown vulnerabilities affecting palo alto networks cloud ngfw are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Palo Alto Networks / Cloud NGFW
All versions affected
Palo Alto Networks / PAN-OS
12.1.0 < 12.1.7, 12.1.4-h5 11.2.0 < 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17 11.1.0 < 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33 10.2.0 < 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, 10.2.7-h34
Palo Alto Networks / Prisma Access
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
security.paloaltonetworks.com: https://security.paloaltonetworks.com/CVE-2026-0261

Credits

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.