Palo Alto Networks on Wednesday published seven security advisories that detail as many vulnerabilities in its products, along with the implementation of recent Chrome fixes.
The most severe of the resolved flaws is CVE-2025-4232, a high-severity improper neutralization of wildcards bug in GlobalProtect for macOS that leads to code injection.
Impacting the log collection feature of the application, the security defect can be exploited by authenticated attackers to elevate their privileges to root, Palo Alto Networks warns.
The company also drew attention to a set of 11 Chrome fixes it implemented in its products alongside a patch for CVE-2025-4233, an inappropriate implementation in cache vulnerability affecting the Prisma Access Browser.
Patches were also released for a medium-severity command injection flaw in PAN-OS, tracked as CVE-2025-4231, that allows an attacker authenticated as an administrator to perform actions as root.
“The attacker must have network access to the management web interface and successfully authenticate to exploit this issue,” the company says.
Another PAN-OS command injection bug, CVE-2025-4230, allows an attacker logged into an administrator account with access to the CLI to bypass system restrictions and execute arbitrary commands as root.
“The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators,” Palo Alto Networks says.
The company has also resolved a PAN-OS defect that could allow users able to intercept packets sent from the firewall to view unencrypted data being sent through the SD-WAN interface, and an incorrect privilege assignment issue in Cortex XDR Broker VM allowing attackers to escalate their privileges to root.
Additionally, the company fixed an improper access control flaw in the Endpoint Traffic Policy Enforcement feature of GlobalProtect for Windows and macOS, leading to packets remaining unencrypted and allowing an attacker with physical access to the network to inject a rogue device and intercept the packets.
Palo Alto Networks says it is not aware of any of these vulnerabilities being exploited in attacks. Additional information can be found on the company’s security advisories page.
Related: Fortinet, Ivanti Patch High-Severity Vulnerabilities
Related: Chrome, Firefox Updates Resolve High-Severity Memory Bugs
Related: Exploited Vulnerability Impacts Over 80,000 Roundcube Servers
Related: Cisco Patches Critical ISE Vulnerability With Public PoC
