Palo Alto Networks Security Advisories / CVE-2026-0242

CVE-2026-0242 Trust Protection Foundation: SQL Injection Vulnerability

Urgency MODERATE

047910
Severity 6.1 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density CONCENTRATED
Attack Vector ADJACENT
Attack Complexity LOW
Attack Requirements NONE
Automatable YES
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required LOW
Subsequent Confidentiality LOW
Subsequent Integrity LOW
Subsequent Availability NONE

Description

A SQL injection vulnerability in Trust Protection Foundation allows an authenticated attacker to execute arbitrary SQL commands against the product database. Successful exploitation could allow an attacker to read sensitive data, modify database contents, and escalate privileges to gain full administrative control of the platform.

Product Status

VersionsAffectedUnaffected
Trust Protection Foundation 25.3.0< 25.3.3
>= 25.3.3
Trust Protection Foundation 25.1.0< 25.1.8
>= 25.1.8
Trust Protection Foundation 24.3.0< 24.3.6
>= 24.3.6
Trust Protection Foundation 24.1.0< 24.1.13
>= 24.1.13

Required Configuration for Exposure

No special configuration is required to be affected by this vulnerability.

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 6.1 / CVSS-B: 8.6 (CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CAPEC-66 SQL Injection

Solution

Version Minor VersionSuggested Solution
Trust Protection Foundation 25.3 25.3.0 through 25.3.2Upgrade to 25.3.3 or later.
Trust Protection Foundation 25.1 25.1.0 through 25.1.7Upgrade to 25.1.8 or later.
Trust Protection Foundation 24.3 24.3.0 through 24.3.5Upgrade to 24.3.6 or later.
Trust Protection Foundation 24.1 24.1.0 through 24.1.12Upgrade to 24.1.13 or later.
All older versions Upgrade to a supported fixed version.

Acknowledgments

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.

CPE Applicability

Timeline

Initial publication.
© 2026 Palo Alto Networks, Inc. All rights reserved.