CVE-2026-0242 (GCVE-0-2026-0242)
Vulnerability from cvelistv5 – Published: 2026-05-13 19:04 – Updated: 2026-05-15 03:56
VLAI?
Title
Trust Protection Foundation: SQL Injection Vulnerability
Summary
A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.
Severity ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0242 | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Palo Alto Networks | Trust Protection Foundation |
Affected:
25.3.0 , < 25.3.3
(custom)
Affected: 25.1.0 , < 25.1.8 (custom) Affected: 24.3.0 , < 24.3.6 (custom) Affected: 24.1.0 , < 24.1.13 (custom) |
Date Public ?
2026-05-13 16:00
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0242",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-14T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-15T03:56:11.733Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Trust Protection Foundation",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "25.3.3",
"status": "unaffected"
}
],
"lessThan": "25.3.3",
"status": "affected",
"version": "25.3.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "25.1.8",
"status": "unaffected"
}
],
"lessThan": "25.1.8",
"status": "affected",
"version": "25.1.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "24.3.6",
"status": "unaffected"
}
],
"lessThan": "24.3.6",
"status": "affected",
"version": "24.3.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "24.1.13",
"status": "unaffected"
}
],
"lessThan": "24.1.13",
"status": "affected",
"version": "24.1.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo special configuration is required to be affected by this vulnerability.\u003c/p\u003e"
}
],
"value": "No special configuration is required to be affected by this vulnerability."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.3.3",
"versionStartIncluding": "25.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.8",
"versionStartIncluding": "25.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.3.6",
"versionStartIncluding": "24.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.1.13",
"versionStartIncluding": "24.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "other",
"value": "Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue."
}
],
"datePublic": "2026-05-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.\u003c/p\u003e"
}
],
"value": "A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-66",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-66 SQL Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "YES",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T19:04:52.841Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0242"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003e\u0026nbsp;Minor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 25.3\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e25.3.0 through 25.3.2\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 25.3.3 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 25.1\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e25.1.0 through 25.1.7\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 25.1.8 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 24.3\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e24.3.0 through 24.3.5\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 24.3.6 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 24.1\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e24.1.0 through 24.1.12\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 24.1.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eAll older versions\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003c/td\u003e\u003ctd\u003eUpgrade to a supported fixed version.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
}
],
"value": "Version Minor Version Suggested Solution\nTrust Protection Foundation 25.3 25.3.0 through 25.3.2 Upgrade to 25.3.3 or later.\nTrust Protection Foundation 25.1 25.1.0 through 25.1.7 Upgrade to 25.1.8 or later.\nTrust Protection Foundation 24.3 24.3.0 through 24.3.5 Upgrade to 24.3.6 or later.\nTrust Protection Foundation 24.1 24.1.0 through 24.1.12 Upgrade to 24.1.13 or later.\nAll older versions Upgrade to a supported fixed version."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-05-13T16:00:00.000Z",
"value": "Initial publication."
}
],
"title": "Trust Protection Foundation: SQL Injection Vulnerability",
"x_affectedList": [
"Trust Protection Foundation 25.3.0",
"Trust Protection Foundation 25.3.1",
"Trust Protection Foundation 25.3.2",
"Trust Protection Foundation 25.1.0",
"Trust Protection Foundation 25.1.1",
"Trust Protection Foundation 25.1.2",
"Trust Protection Foundation 25.1.3",
"Trust Protection Foundation 25.1.4",
"Trust Protection Foundation 25.1.5",
"Trust Protection Foundation 25.1.6",
"Trust Protection Foundation 25.1.7",
"Trust Protection Foundation 24.3.0",
"Trust Protection Foundation 24.3.1",
"Trust Protection Foundation 24.3.2",
"Trust Protection Foundation 24.3.3",
"Trust Protection Foundation 24.3.4",
"Trust Protection Foundation 24.3.5",
"Trust Protection Foundation 24.1.0",
"Trust Protection Foundation 24.1.1",
"Trust Protection Foundation 24.1.2",
"Trust Protection Foundation 24.1.3",
"Trust Protection Foundation 24.1.4",
"Trust Protection Foundation 24.1.5",
"Trust Protection Foundation 24.1.6",
"Trust Protection Foundation 24.1.7",
"Trust Protection Foundation 24.1.8",
"Trust Protection Foundation 24.1.9",
"Trust Protection Foundation 24.1.10",
"Trust Protection Foundation 24.1.11",
"Trust Protection Foundation 24.1.12"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0242",
"datePublished": "2026-05-13T19:04:52.841Z",
"dateReserved": "2025-11-03T20:44:03.175Z",
"dateUpdated": "2026-05-15T03:56:11.733Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-0242",
"date": "2026-05-16",
"epss": "7e-05",
"percentile": "0.00482"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-0242\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2026-05-13T19:16:58.130\",\"lastModified\":\"2026-05-14T16:21:23.190\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"LOW\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"YES\",\"Recovery\":\"USER\",\"valueDensity\":\"CONCENTRATED\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2026-0242\",\"source\":\"psirt@paloaltonetworks.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0242\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-13T19:17:12.940083Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-13T19:29:33.504Z\"}}], \"cna\": {\"title\": \"Trust Protection Foundation: SQL Injection Vulnerability\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"other\", \"value\": \"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.\"}], \"impacts\": [{\"capecId\": \"CAPEC-66\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-66 SQL Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 6.1, \"Automatable\": \"YES\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"CONCENTRATED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"LOW\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Palo Alto Networks\", \"product\": \"Trust Protection Foundation\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"25.3.3\", \"status\": \"unaffected\"}], \"version\": \"25.3.0\", \"lessThan\": \"25.3.3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"25.1.8\", \"status\": \"unaffected\"}], \"version\": \"25.1.0\", \"lessThan\": \"25.1.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"24.3.6\", \"status\": \"unaffected\"}], \"version\": \"24.3.0\", \"lessThan\": \"24.3.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"24.1.13\", \"status\": \"unaffected\"}], \"version\": \"24.1.0\", \"lessThan\": \"24.1.13\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-05-13T16:00:00.000Z\", \"value\": \"Initial publication.\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"Version Minor Version Suggested Solution\\nTrust Protection Foundation 25.3 25.3.0 through 25.3.2 Upgrade to 25.3.3 or later.\\nTrust Protection Foundation 25.1 25.1.0 through 25.1.7 Upgrade to 25.1.8 or later.\\nTrust Protection Foundation 24.3 24.3.0 through 24.3.5 Upgrade to 24.3.6 or later.\\nTrust Protection Foundation 24.1 24.1.0 through 24.1.12 Upgrade to 24.1.13 or later.\\nAll older versions Upgrade to a supported fixed version.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ctable class=\\\"tbl\\\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003e\u0026nbsp;Minor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 25.3\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e25.3.0 through 25.3.2\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 25.3.3 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 25.1\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e25.1.0 through 25.1.7\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 25.1.8 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 24.3\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e24.3.0 through 24.3.5\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 24.3.6 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eTrust Protection Foundation 24.1\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003cspan\u003e24.1.0 through 24.1.12\u003c/span\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 24.1.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eAll older versions\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003c/td\u003e\u003ctd\u003eUpgrade to a supported fixed version.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-05-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2026-0242\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}], \"configurations\": [{\"lang\": \"eng\", \"value\": \"No special configuration is required to be affected by this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo special configuration is required to be affected by this vulnerability.\u003c/p\u003e\", \"base64\": false}]}], \"x_affectedList\": [\"Trust Protection Foundation 25.3.0\", \"Trust Protection Foundation 25.3.1\", \"Trust Protection Foundation 25.3.2\", \"Trust Protection Foundation 25.1.0\", \"Trust Protection Foundation 25.1.1\", \"Trust Protection Foundation 25.1.2\", \"Trust Protection Foundation 25.1.3\", \"Trust Protection Foundation 25.1.4\", \"Trust Protection Foundation 25.1.5\", \"Trust Protection Foundation 25.1.6\", \"Trust Protection Foundation 25.1.7\", \"Trust Protection Foundation 24.3.0\", \"Trust Protection Foundation 24.3.1\", \"Trust Protection Foundation 24.3.2\", \"Trust Protection Foundation 24.3.3\", \"Trust Protection Foundation 24.3.4\", \"Trust Protection Foundation 24.3.5\", \"Trust Protection Foundation 24.1.0\", \"Trust Protection Foundation 24.1.1\", \"Trust Protection Foundation 24.1.2\", \"Trust Protection Foundation 24.1.3\", \"Trust Protection Foundation 24.1.4\", \"Trust Protection Foundation 24.1.5\", \"Trust Protection Foundation 24.1.6\", \"Trust Protection Foundation 24.1.7\", \"Trust Protection Foundation 24.1.8\", \"Trust Protection Foundation 24.1.9\", \"Trust Protection Foundation 24.1.10\", \"Trust Protection Foundation 24.1.11\", \"Trust Protection Foundation 24.1.12\"], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"25.3.3\", \"versionStartIncluding\": \"25.3.0\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"25.1.8\", \"versionStartIncluding\": \"25.1.0\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"24.3.6\", \"versionStartIncluding\": \"24.3.0\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"24.1.13\", \"versionStartIncluding\": \"24.1.0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2026-05-13T19:04:52.841Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-0242\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-15T03:56:11.733Z\", \"dateReserved\": \"2025-11-03T20:44:03.175Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2026-05-13T19:04:52.841Z\", \"assignerShortName\": \"palo_alto\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…