Cyber Security News

PoC Exploit Released for Palo Alto Expedition Tool OS Command Injection Vulnerability

A recently disclosed vulnerability in Palo Alto Networks’ Expedition tool has raised significant security concerns, as a proof-of-concept (PoC) exploit has been released for CVE-2025-0107.

This OS command injection vulnerability allows remote attackers to execute arbitrary code on affected systems, posing a severe risk to organizations utilizing the tool.

The flaw, identified as CVE-2025-0107, resides in the /API/regionsDiscovery.php endpoint of the Expedition tool. Exploitation of this vulnerability requires no authentication and enables attackers to trigger a connection to an attacker-controlled Apache Spark server.

The malicious server can then deliver a Java package that is executed by the Expedition server, leading to arbitrary code execution. This vulnerability impacts versions 1.2.101 and earlier of the tool.

The Expedition tool, designed to assist in migrating configurations from third-party firewalls to Palo Alto’s Next-Generation Firewall (NGFW) platform, reached its end-of-life (EoL) on December 31, 2024.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Despite its EoL status, many organizations may still rely on it for critical migration tasks, increasing the urgency of addressing this issue.

Palo Alto Expedition Tool OS Command Injection Vulnerability

The vulnerability exploits insufficient input sanitization in the affected endpoint. By crafting a malicious request with specific parameters, attackers can manipulate the tool into executing commands on the underlying operating system. The exploit involves:

  1. Sending a request to the vulnerable endpoint with parameters pointing to a fake Apache Spark server.
  2. The attacker-controlled server responds with a malicious Java payload.
  3. The payload is executed by the Expedition server, granting attackers control over the system.

Security researchers have released a PoC exploit demonstrating how attackers can leverage this vulnerability. The PoC includes Python scripts that simulate both the attack and the fake Spark server used to deliver malicious payloads.

Palo Alto Networks has released patches addressing this issue in Expedition version 1.2.101 and later. Users are strongly urged to upgrade their systems immediately and restrict network access to authorized users only.

Mitigation Recommendations

To protect against potential exploitation:

  • Upgrade to Expedition version 1.2.101 or later.
  • Restrict access to the Expedition tool’s interface to trusted networks.
  • Disable unused instances of Expedition if no longer required.
  • Rotate all credentials processed through the tool as a precautionary measure.

The release of a PoC exploit significantly increases the likelihood of attacks targeting this vulnerability. Organizations using outdated versions of the Expedition tool must act swiftly to patch their systems and mitigate risks.

While Palo Alto Networks has retired Expedition, its use in migration processes underscores the importance of securing temporary tools handling sensitive data.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known…

1 hour ago

RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access

Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as "Salt…

3 hours ago

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code

A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master…

3 hours ago

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution

Researchers have uncovered a high-severity SQL injection vulnerability, CVE-2025-1094, affecting PostgreSQL’s interactive terminal tool, psql. …

4 hours ago

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code

A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute…

8 hours ago

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability

Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as…

9 hours ago