CVE-2026-0238 (GCVE-0-2026-0238)
Vulnerability from cvelistv5 – Published: 2026-05-13 18:22 – Updated: 2026-05-13 18:55
VLAI?
Title
Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
Summary
A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.
Severity ?
CWE
- CWE-20 - Improper Input Validation
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0238 | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Palo Alto Networks | Broker VM |
Affected:
30.0 , < 30.0.24
(custom)
|
Date Public ?
2026-05-13 16:00
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0238",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-13T18:55:00.471145Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:55:30.943Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Broker VM",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "30.0.24",
"status": "unaffected"
}
],
"lessThan": "30.0.24",
"status": "affected",
"version": "30.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
}
],
"value": "No special configuration is required to be affected by this issue."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.0.24",
"versionStartIncluding": "30.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "other",
"value": "This issue was discovered during an internal penetration test."
}
],
"datePublic": "2026-05-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e"
}
],
"value": "A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 1.1,
"baseSeverity": "LOW",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:22:00.405Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0238"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
}
],
"value": "Version Minor Version Suggested Solution\nBroker VM 30.0 30.0.24 or earlier Upgrade to 30.0.24 or later."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-05-13T16:00:00.000Z",
"value": "Initial Publication."
}
],
"title": "Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields",
"workarounds": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
}
],
"value": "No known workarounds exist for this issue."
}
],
"x_affectedList": [
"Cortex XDR 30.0.0",
"Cortex XDR 30.0.1",
"Cortex XDR 30.0.2",
"Cortex XDR 30.0.3",
"Cortex XDR 30.0.4",
"Cortex XDR 30.0.5",
"Cortex XDR 30.0.6",
"Cortex XDR 30.0.7",
"Cortex XDR 30.0.8",
"Cortex XDR 30.0.9",
"Cortex XDR 30.0.10",
"Cortex XDR 30.0.11",
"Cortex XDR 30.0.12",
"Cortex XDR 30.0.13",
"Cortex XDR 30.0.14",
"Cortex XDR 30.0.15",
"Cortex XDR 30.0.16",
"Cortex XDR 30.0.17",
"Cortex XDR 30.0.18",
"Cortex XDR 30.0.19",
"Cortex XDR 30.0.20",
"Cortex XDR 30.0.21",
"Cortex XDR 30.0.22",
"Cortex XDR 30.0.23",
"Cortex XDR 30.0.24",
"Cortex XDR 30.0.25",
"Cortex XDR 30.0.26",
"Cortex XDR 30.0.27",
"Cortex XDR 30.0.28",
"Cortex XDR 30.0.29",
"Cortex XDR 30.0.30",
"Cortex XDR 30.0.31",
"Cortex XDR 30.0.32",
"Cortex XDR 30.0.33",
"Cortex XDR 30.0.34",
"Cortex XDR 30.0.35",
"Cortex XDR 30.0.36",
"Cortex XDR 30.0.37",
"Cortex XDR 30.0.38",
"Cortex XDR 30.0.39",
"Cortex XDR 30.0.40",
"Cortex XDR 30.0.41",
"Cortex XDR 30.0.42",
"Cortex XDR 30.0.43",
"Cortex XDR 30.0.44",
"Cortex XDR 30.0.45",
"Cortex XDR 30.0.46",
"Cortex XDR 30.0.47",
"Cortex XDR 30.0.48",
"Cortex XDR 30.0.49",
"Cortex XDR 30.0.50",
"Cortex XDR 30.0.51"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0238",
"datePublished": "2026-05-13T18:22:00.405Z",
"dateReserved": "2025-11-03T20:43:59.121Z",
"dateUpdated": "2026-05-13T18:55:30.943Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-0238",
"date": "2026-05-16",
"epss": "0.00028",
"percentile": "0.08249"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-0238\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2026-05-13T19:16:57.417\",\"lastModified\":\"2026-05-14T16:21:23.190\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber\",\"baseScore\":1.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2026-0238\",\"source\":\"psirt@paloaltonetworks.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0238\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-13T18:55:00.471145Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-13T18:55:26.040Z\"}}], \"cna\": {\"title\": \"Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"other\", \"value\": \"This issue was discovered during an internal penetration test.\"}], \"impacts\": [{\"capecId\": \"CAPEC-153\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-153 Input Data Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 1.1, \"Automatable\": \"NO\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Palo Alto Networks\", \"product\": \"Broker VM\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"30.0.24\", \"status\": \"unaffected\"}], \"version\": \"30.0\", \"lessThan\": \"30.0.24\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-05-13T16:00:00.000Z\", \"value\": \"Initial Publication.\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"Version Minor Version Suggested Solution\\nBroker VM 30.0 30.0.24 or earlier Upgrade to 30.0.24 or later.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ctable class=\\\"tbl\\\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-05-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2026-0238\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"eng\", \"value\": \"No known workarounds exist for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"configurations\": [{\"lang\": \"eng\", \"value\": \"No special configuration is required to be affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_affectedList\": [\"Cortex XDR 30.0.0\", \"Cortex XDR 30.0.1\", \"Cortex XDR 30.0.2\", \"Cortex XDR 30.0.3\", \"Cortex XDR 30.0.4\", \"Cortex XDR 30.0.5\", \"Cortex XDR 30.0.6\", \"Cortex XDR 30.0.7\", \"Cortex XDR 30.0.8\", \"Cortex XDR 30.0.9\", \"Cortex XDR 30.0.10\", \"Cortex XDR 30.0.11\", \"Cortex XDR 30.0.12\", \"Cortex XDR 30.0.13\", \"Cortex XDR 30.0.14\", \"Cortex XDR 30.0.15\", \"Cortex XDR 30.0.16\", \"Cortex XDR 30.0.17\", \"Cortex XDR 30.0.18\", \"Cortex XDR 30.0.19\", \"Cortex XDR 30.0.20\", \"Cortex XDR 30.0.21\", \"Cortex XDR 30.0.22\", \"Cortex XDR 30.0.23\", \"Cortex XDR 30.0.24\", \"Cortex XDR 30.0.25\", \"Cortex XDR 30.0.26\", \"Cortex XDR 30.0.27\", \"Cortex XDR 30.0.28\", \"Cortex XDR 30.0.29\", \"Cortex XDR 30.0.30\", \"Cortex XDR 30.0.31\", \"Cortex XDR 30.0.32\", \"Cortex XDR 30.0.33\", \"Cortex XDR 30.0.34\", \"Cortex XDR 30.0.35\", \"Cortex XDR 30.0.36\", \"Cortex XDR 30.0.37\", \"Cortex XDR 30.0.38\", \"Cortex XDR 30.0.39\", \"Cortex XDR 30.0.40\", \"Cortex XDR 30.0.41\", \"Cortex XDR 30.0.42\", \"Cortex XDR 30.0.43\", \"Cortex XDR 30.0.44\", \"Cortex XDR 30.0.45\", \"Cortex XDR 30.0.46\", \"Cortex XDR 30.0.47\", \"Cortex XDR 30.0.48\", \"Cortex XDR 30.0.49\", \"Cortex XDR 30.0.50\", \"Cortex XDR 30.0.51\"], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"30.0.24\", \"versionStartIncluding\": \"30.0.0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2026-05-13T18:22:00.405Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-0238\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-13T18:55:30.943Z\", \"dateReserved\": \"2025-11-03T20:43:59.121Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2026-05-13T18:22:00.405Z\", \"assignerShortName\": \"palo_alto\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…