CVE-2026-0242 Trust Protection Foundation: SQL Injection Vulnerability
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
CONCENTRATED
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
NONE
Automatable
YES
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
HIGH
Privileges Required
LOW
Subsequent Confidentiality
LOW
Subsequent Integrity
LOW
Subsequent Availability
NONE
Description
A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Trust Protection Foundation 25.3.0 | < 25.3.3 | >= 25.3.3 |
| Trust Protection Foundation 25.1.0 | < 25.1.8 | >= 25.1.8 |
| Trust Protection Foundation 24.3.0 | < 24.3.6 | >= 24.3.6 |
| Trust Protection Foundation 24.1.0 | < 24.1.13 | >= 24.1.13 |
Required Configuration for Exposure
No special configuration is required to be affected by this vulnerability.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 6.1 / CVSS-B: 8.6 (CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Solution
| Version | Minor Version | Suggested Solution |
|---|---|---|
| Trust Protection Foundation 25.3 | 25.3.0 through 25.3.2 | Upgrade to 25.3.3 or later. |
| Trust Protection Foundation 25.1 | 25.1.0 through 25.1.7 | Upgrade to 25.1.8 or later. |
| Trust Protection Foundation 24.3 | 24.3.0 through 24.3.5 | Upgrade to 24.3.6 or later. |
| Trust Protection Foundation 24.1 | 24.1.0 through 24.1.12 | Upgrade to 24.1.13 or later. |
| All older versions | Upgrade to a supported fixed version. |
Acknowledgments
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)25.3.0 and up to (excluding)25.3.3
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)25.1.0 and up to (excluding)25.1.8
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)24.3.0 and up to (excluding)24.3.6
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)24.1.0 and up to (excluding)24.1.13
Timeline
Initial publication.