{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Escalation of Privilege in Twistlock"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: CVE-2019-1583","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:25:22.574Z","generator":{"date":"2026-04-11T00:25:22.574Z","engine":{"name":"Vulnogram","version":"0.0.9"}},"id":"CVE-2019-1583","initial_release_date":"2019-08-22T16:17:00.000Z","revision_history":[{"number":"1","date":"2026-04-10T17:25:22.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[]}]},"vulnerabilities":[{"cve":"CVE-2019-1583","product_status":{"fixed":["PANW-Twistlock-Console-2"],"known_affected":["PANW-Twistlock-Console-1"]},"notes":[{"category":"description","text":"An HTML injection vulnerability has been identified in the Twistlock Console that can lead to a DOM based XSS attack under certain configurations.  (Ref #, CVE-2019-1583)\nSuccessful exploitation of this vulnerability allows a Twistlock user with Operator capabilities to escalate privileges to that of another user. Active interaction with an affected component is required for the payload to execute on the victim.\nThis issue affects Twistlock console 19.07.357 and earlier"}],"references":[{"category":"external","summary":"NVD - CVE-2019-1583","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1583"},{"category":"self","summary":"Palo Alto Networks Security Advisory CVE-2019-1583","url":"https://security.paloaltonetworks.com/CVE-2019-1583"}],"threats":[{"category":"impact","description":"An HTML injection vulnerability has been identified in the Twistlock Console that can lead to a DOM based XSS attack under certain configurations.  (Ref #, CVE-2019-1583)\nSuccessful exploitation of this vulnerability allows a Twistlock user with Operator capabilities to escalate privileges to that of another user. Active interaction with an affected component is required for the payload to execute on the victim.\nThis issue affects Twistlock console 19.07.357 and earlier"}],"scores":[{"cvss_v3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"},"products":["PANW-Twistlock-Console-1"]}]}]}