Palo Alto Networks Security Advisories / PAN-SA-2025-0005

PAN-SA-2025-0005 GlobalProtect Clientless VPN: Clientless VPN Misconfiguration Allows Cross-Site Attacks


Informational

Description

Palo Alto Networks GlobalProtect Clientless VPN is intended to provide secure remote access to trusted internal applications. It is not meant to provide access to the Internet, intranet or multiple websites.

When the Clientless VPN is misconfigured to allow access to the Internet or any internal website, it allows malicious scripts on one site to obtain sensitive information or modify content of any application accessible through the VPN including Clientless VPN itself.

For further details about the risks of Clientless VPNs please refer to https://www.kb.cert.org/vuls/id/261869

Product Status

VersionsAffectedUnaffected
Cloud NGFWNoneAll
PAN-OSAllNone
Prisma AccessAllNone

Required Configuration for Exposure

All of the following must be true to be impacted by this:

  1. You have a valid GlobalProtect Subscription license.
  2. Clientless VPN is enabled in the GlobalProtect Portal configuration.
    1. Browse to [ Network > GlobalProtect > Portals > Click on Portal config to open
    2. Select [ Clientless VPN tab > General ] If the Clientless VPN checkbox is checked, then the feature is enabled. Take note of the “Security Zones” configured for the next step.

  3. Security Policies allow Clientless VPN access to more than one internal or external Application.
    1. From the previous step, use the “Security Zones” configured to verify existing Security Policies for Clientless VPN. In our example, it is named “Clientless-VPN”.
    2. Go to [Policies > Security ]. In the search bar, type the found “Security Zones” name (Clientless-VPN in our example), to verify existing Security Policies for Clientless VPN that allow access to more than one trusted site.

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Workarounds and Mitigations

The Clientless VPN feature only ensures secure remote access to a single trusted application. Ensure that the Clientless VPN access is limited by Security Policies to a single trusted site. Refer to the Configure Clientless VPN page for additional details.
For accessing multiple applications, since the Same-Origin Policy is not enforced, we strongly recommend configuring access to only trusted pages through Clientless VPN.
Clientless VPN should never be used to allow access to the internet or intranet. If you need to secure access to untrusted websites, please consider the following alternatives:

Timeline

Initial Publication
© 2025 Palo Alto Networks, Inc. All rights reserved.