Search criteria
2 vulnerabilities found for Broker VM by Palo Alto Networks
CVE-2026-0238 (GCVE-0-2026-0238)
Vulnerability from nvd – Published: 2026-05-13 18:22 – Updated: 2026-05-13 18:55
VLAI?
Title
Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
Summary
A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.
Severity ?
CWE
- CWE-20 - Improper Input Validation
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0238 | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Palo Alto Networks | Broker VM |
Affected:
30.0 , < 30.0.24
(custom)
|
Date Public ?
2026-05-13 16:00
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0238",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-13T18:55:00.471145Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:55:30.943Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Broker VM",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "30.0.24",
"status": "unaffected"
}
],
"lessThan": "30.0.24",
"status": "affected",
"version": "30.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
}
],
"value": "No special configuration is required to be affected by this issue."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.0.24",
"versionStartIncluding": "30.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "other",
"value": "This issue was discovered during an internal penetration test."
}
],
"datePublic": "2026-05-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e"
}
],
"value": "A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 1.1,
"baseSeverity": "LOW",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:22:00.405Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0238"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
}
],
"value": "Version Minor Version Suggested Solution\nBroker VM 30.0 30.0.24 or earlier Upgrade to 30.0.24 or later."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-05-13T16:00:00.000Z",
"value": "Initial Publication."
}
],
"title": "Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields",
"workarounds": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
}
],
"value": "No known workarounds exist for this issue."
}
],
"x_affectedList": [
"Cortex XDR 30.0.0",
"Cortex XDR 30.0.1",
"Cortex XDR 30.0.2",
"Cortex XDR 30.0.3",
"Cortex XDR 30.0.4",
"Cortex XDR 30.0.5",
"Cortex XDR 30.0.6",
"Cortex XDR 30.0.7",
"Cortex XDR 30.0.8",
"Cortex XDR 30.0.9",
"Cortex XDR 30.0.10",
"Cortex XDR 30.0.11",
"Cortex XDR 30.0.12",
"Cortex XDR 30.0.13",
"Cortex XDR 30.0.14",
"Cortex XDR 30.0.15",
"Cortex XDR 30.0.16",
"Cortex XDR 30.0.17",
"Cortex XDR 30.0.18",
"Cortex XDR 30.0.19",
"Cortex XDR 30.0.20",
"Cortex XDR 30.0.21",
"Cortex XDR 30.0.22",
"Cortex XDR 30.0.23",
"Cortex XDR 30.0.24",
"Cortex XDR 30.0.25",
"Cortex XDR 30.0.26",
"Cortex XDR 30.0.27",
"Cortex XDR 30.0.28",
"Cortex XDR 30.0.29",
"Cortex XDR 30.0.30",
"Cortex XDR 30.0.31",
"Cortex XDR 30.0.32",
"Cortex XDR 30.0.33",
"Cortex XDR 30.0.34",
"Cortex XDR 30.0.35",
"Cortex XDR 30.0.36",
"Cortex XDR 30.0.37",
"Cortex XDR 30.0.38",
"Cortex XDR 30.0.39",
"Cortex XDR 30.0.40",
"Cortex XDR 30.0.41",
"Cortex XDR 30.0.42",
"Cortex XDR 30.0.43",
"Cortex XDR 30.0.44",
"Cortex XDR 30.0.45",
"Cortex XDR 30.0.46",
"Cortex XDR 30.0.47",
"Cortex XDR 30.0.48",
"Cortex XDR 30.0.49",
"Cortex XDR 30.0.50",
"Cortex XDR 30.0.51"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0238",
"datePublished": "2026-05-13T18:22:00.405Z",
"dateReserved": "2025-11-03T20:43:59.121Z",
"dateUpdated": "2026-05-13T18:55:30.943Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-0238 (GCVE-0-2026-0238)
Vulnerability from cvelistv5 – Published: 2026-05-13 18:22 – Updated: 2026-05-13 18:55
VLAI?
Title
Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
Summary
A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.
Severity ?
CWE
- CWE-20 - Improper Input Validation
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0238 | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Palo Alto Networks | Broker VM |
Affected:
30.0 , < 30.0.24
(custom)
|
Date Public ?
2026-05-13 16:00
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0238",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-13T18:55:00.471145Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:55:30.943Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Broker VM",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "30.0.24",
"status": "unaffected"
}
],
"lessThan": "30.0.24",
"status": "affected",
"version": "30.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
}
],
"value": "No special configuration is required to be affected by this issue."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.0.24",
"versionStartIncluding": "30.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "other",
"value": "This issue was discovered during an internal penetration test."
}
],
"datePublic": "2026-05-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e"
}
],
"value": "A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 1.1,
"baseSeverity": "LOW",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:22:00.405Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0238"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
}
],
"value": "Version Minor Version Suggested Solution\nBroker VM 30.0 30.0.24 or earlier Upgrade to 30.0.24 or later."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-05-13T16:00:00.000Z",
"value": "Initial Publication."
}
],
"title": "Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields",
"workarounds": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
}
],
"value": "No known workarounds exist for this issue."
}
],
"x_affectedList": [
"Cortex XDR 30.0.0",
"Cortex XDR 30.0.1",
"Cortex XDR 30.0.2",
"Cortex XDR 30.0.3",
"Cortex XDR 30.0.4",
"Cortex XDR 30.0.5",
"Cortex XDR 30.0.6",
"Cortex XDR 30.0.7",
"Cortex XDR 30.0.8",
"Cortex XDR 30.0.9",
"Cortex XDR 30.0.10",
"Cortex XDR 30.0.11",
"Cortex XDR 30.0.12",
"Cortex XDR 30.0.13",
"Cortex XDR 30.0.14",
"Cortex XDR 30.0.15",
"Cortex XDR 30.0.16",
"Cortex XDR 30.0.17",
"Cortex XDR 30.0.18",
"Cortex XDR 30.0.19",
"Cortex XDR 30.0.20",
"Cortex XDR 30.0.21",
"Cortex XDR 30.0.22",
"Cortex XDR 30.0.23",
"Cortex XDR 30.0.24",
"Cortex XDR 30.0.25",
"Cortex XDR 30.0.26",
"Cortex XDR 30.0.27",
"Cortex XDR 30.0.28",
"Cortex XDR 30.0.29",
"Cortex XDR 30.0.30",
"Cortex XDR 30.0.31",
"Cortex XDR 30.0.32",
"Cortex XDR 30.0.33",
"Cortex XDR 30.0.34",
"Cortex XDR 30.0.35",
"Cortex XDR 30.0.36",
"Cortex XDR 30.0.37",
"Cortex XDR 30.0.38",
"Cortex XDR 30.0.39",
"Cortex XDR 30.0.40",
"Cortex XDR 30.0.41",
"Cortex XDR 30.0.42",
"Cortex XDR 30.0.43",
"Cortex XDR 30.0.44",
"Cortex XDR 30.0.45",
"Cortex XDR 30.0.46",
"Cortex XDR 30.0.47",
"Cortex XDR 30.0.48",
"Cortex XDR 30.0.49",
"Cortex XDR 30.0.50",
"Cortex XDR 30.0.51"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0238",
"datePublished": "2026-05-13T18:22:00.405Z",
"dateReserved": "2025-11-03T20:43:59.121Z",
"dateUpdated": "2026-05-13T18:55:30.943Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}