Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52987: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights)

0
Medium
VulnerabilityCVE-2025-52987cvecve-2025-52987cwe-1021
Published: Thu Jan 15 2026 (01/15/2026, 20:10:44 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Paragon Automation (Pathfinder, Planner, Insights)

Description

CVE-2025-52987 is a medium-severity clickjacking vulnerability in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights) web portal versions prior to 24. 1. 1. The vulnerability arises because the application fails to set appropriate X-Frame-Options and X-Content-Type HTTP headers, allowing attackers to embed the interface in a malicious frame. This enables attackers to trick users into interacting with the application unknowingly, potentially leading to unauthorized actions or data exposure. Exploitation requires user interaction but no authentication, and the vulnerability impacts confidentiality and integrity without affecting availability. No known exploits are currently reported in the wild. European organizations using affected Juniper Paragon Automation products should prioritize patching and implement additional mitigations to reduce risk. Countries with significant Juniper Networks deployments and critical infrastructure relying on network automation are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/15/2026, 21:34:44 UTC

Technical Analysis

CVE-2025-52987 is a clickjacking vulnerability identified in Juniper Networks Paragon Automation suite, including Pathfinder, Planner, and Insights components. The root cause is the absence of proper HTTP headers—specifically X-Frame-Options and X-Content-Type—that prevent the web portal from being embedded within frames or iframes on attacker-controlled websites. Without these headers, an attacker can craft a malicious webpage that loads the Paragon Automation interface invisibly or deceptively, tricking users into performing unintended actions such as configuration changes or data disclosure. The vulnerability affects all versions prior to 24.1.1. The CVSS v3.1 score is 6.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C) because the vulnerability can affect resources beyond the vulnerable component. Confidentiality and integrity impacts are low, as attackers can potentially manipulate user actions or view sensitive UI elements, but availability is not impacted. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where Paragon Automation is used for critical network management and automation tasks. The lack of X-Frame-Options and X-Content-Type headers is a common web security misconfiguration that can be mitigated by setting these headers to deny framing or restrict framing to trusted origins.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized manipulation of network automation workflows or exposure of sensitive operational data if users are tricked into interacting with a maliciously framed interface. Given that Paragon Automation is used for network path planning, insights, and automation, successful exploitation could undermine network integrity and confidentiality, potentially disrupting service quality or exposing strategic network configurations. While availability is not directly impacted, the indirect effects on network operations could be significant. Organizations in sectors such as telecommunications, finance, energy, and government—where Juniper products are prevalent—are at higher risk. The requirement for user interaction means social engineering or phishing campaigns could be used to exploit this vulnerability, increasing the risk in environments with less user security awareness.

Mitigation Recommendations

Beyond applying the official patch or upgrading to version 24.1.1 or later, organizations should implement Content Security Policy (CSP) frame-ancestors directives to restrict framing to trusted domains. Web application firewalls (WAFs) can be configured to detect and block suspicious framing attempts or HTTP requests lacking proper headers. User awareness training should emphasize the risks of interacting with unknown or suspicious links, especially those that could embed trusted interfaces. Network segmentation and strict access controls can limit exposure of the Paragon Automation portal to only trusted internal users. Regular security audits and penetration testing should include checks for clickjacking vulnerabilities and HTTP header configurations. Monitoring for anomalous user actions within the Paragon Automation portal can help detect potential exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2025-06-23T18:23:44.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69695d667c726673b645f26a

Added to database: 1/15/2026, 9:34:30 PM

Last enriched: 1/15/2026, 9:34:44 PM

Last updated: 1/15/2026, 11:42:05 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats