
13/12/2023

2/8/2024
CVE-2023-6789: PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
First published: Wed Dec 13 2023(Updated: )
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.26 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.17 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.11 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.5 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.2 | |
Remedy
This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions.
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2023-6789?
CVE-2023-6789 is classified as a high severity cross-site scripting (XSS) vulnerability.
How do I fix CVE-2023-6789?
To fix CVE-2023-6789, upgrade your Palo Alto Networks PAN-OS to the latest patched version.
Who is affected by CVE-2023-6789?
CVE-2023-6789 affects authenticated administrators using vulnerable versions of Palo Alto Networks PAN-OS.
What versions of PAN-OS are vulnerable to CVE-2023-6789?
Versions 8.1.0 to 8.1.26, 9.0.0 to 9.0.17, 9.1.0 to 9.1.17, 10.1.0 to 10.1.11, 10.2.0 to 10.2.5, and 11.0.0 to 11.0.2 are affected by CVE-2023-6789.
What type of vulnerability is CVE-2023-6789?
CVE-2023-6789 is a cross-site scripting (XSS) vulnerability that allows execution of stored JavaScript payloads.
- agent/softwarecombine
- agent/first-publish-date
- agent/type
- agent/event
- agent/title
- agent/remedy
- agent/weakness
- agent/author
- agent/severity
- agent/references
- agent/description
- collector/epss-latest
- source/FIRST
- agent/epss
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/source
- agent/tags
- collector/nvd-api
- agent/software-canonical-lookup-request
- vendor/paloaltonetworks
- canonical/palo alto networks pan-os
- version/palo alto networks pan-os/8.1.0
- version/palo alto networks pan-os/9.0.0
- version/palo alto networks pan-os/9.1.0
- version/palo alto networks pan-os/10.1.0
- version/palo alto networks pan-os/10.2.0
- version/palo alto networks pan-os/11.0.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203