Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5906: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Palo Alto Networks Prisma Cloud Compute

0
Medium
VulnerabilityCVE-2024-5906cvecve-2024-5906cwe-79
Published: Wed Jun 12 2024 (06/12/2024, 16:22:38 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Prisma Cloud Compute

Description

CVE-2024-5906 is a medium severity cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute version 32. It allows a malicious administrator with add/edit permissions for identity providers to inject JavaScript payloads via the web interface. When another user accesses the affected interface, the malicious script executes in their browser context, potentially enabling unauthorized actions. Exploitation requires high privilege (administrator with specific permissions) and user interaction (the victim must access the interface). There are no known exploits in the wild currently. The vulnerability impacts confidentiality and integrity to a limited extent and does not affect availability. Organizations using Prisma Cloud Compute should apply patches once available and restrict administrative permissions carefully.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:55:37 UTC

Technical Analysis

CVE-2024-5906 is a cross-site scripting (XSS) vulnerability classified under CWE-79 found in Palo Alto Networks Prisma Cloud Compute, specifically version 32. The flaw arises from improper neutralization of input during web page generation, allowing a malicious administrator with add/edit permissions on identity providers to store arbitrary JavaScript code via the web interface. This stored XSS payload executes when another user accesses the affected interface, causing the victim's browser to run the injected script in their security context. This can lead to unauthorized actions performed on behalf of the victim user, such as session hijacking or manipulation of the web interface. The vulnerability requires the attacker to have high-level privileges (administrator with specific permissions) and the victim to interact with the interface, limiting the attack scope. The CVSS 4.0 score is 4.8 (medium), reflecting network attack vector, low complexity, no authentication required for the victim, but requiring high privileges for the attacker and user interaction. No known public exploits exist yet, and no patches have been linked at the time of publication. This vulnerability highlights the importance of input validation and output encoding in web applications, especially in administrative interfaces managing identity providers.

Potential Impact

The primary impact of CVE-2024-5906 is on the confidentiality and integrity of user sessions within Prisma Cloud Compute environments. A malicious administrator can inject scripts that execute in other users' browsers, potentially allowing session hijacking, unauthorized actions, or data exposure within the web interface. While availability is not directly affected, the trustworthiness of the administrative interface is compromised. Organizations relying on Prisma Cloud Compute for container security and cloud workload protection could face internal threats from privileged insiders exploiting this vulnerability. The requirement for high privileges limits external exploitation but raises concerns about insider threat and privilege misuse. If exploited, it could lead to unauthorized changes in security configurations or identity provider settings, impacting overall cloud security posture.

Mitigation Recommendations

Organizations should immediately audit and restrict administrative permissions, ensuring only trusted personnel have add/edit rights for identity providers. Implement strict role-based access controls (RBAC) and monitor administrative activities for suspicious behavior. Until a patch is released, avoid using the affected functionality or limit access to the Prisma Cloud Compute web interface via network segmentation and VPNs. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious script injections. Educate administrators about the risks of privilege misuse and enforce multi-factor authentication (MFA) to reduce risk of compromised credentials. Once Palo Alto Networks releases a patch, apply it promptly. Additionally, conduct regular security assessments and penetration testing focused on administrative interfaces to detect similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-06-12T15:27:55.088Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d124

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:55:37 AM

Last updated: 2/26/2026, 11:17:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats