Home

Description

An arbitrary File Read and Delete Vulnerability in Palo Alto Networks WildFire® WF-500 and WF-500-B appliances enables users to read sensitive information and delete arbitrary files. This vulnerability affects WF-500 and WF-500-B appliances running in the default non-FIPS configuration mode. The WildFire Appliance (WF-500, WF-500-B) software update is now available to customers that use the WildFire Appliance (WF-500, WF-500-B) for on-premise sandboxing. Please note that customers using the WildFire Public cloud service are NOT impacted by this vulnerability.

PUBLISHED Reserved 2025-11-03 | Published 2026-05-13 | Updated 2026-05-13 | Assigner palo_alto




MEDIUM: 5.0CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber

Problem types

CWE-73 External Control of File Name or Path

Product status

Default status
unaffected

12.1.0 (custom) before 12.1.7, 12.1.4-h5
affected

11.2.0 (custom) before 11.2.11,11.2.7-h7
affected

11.1.0 (custom) before 11.1.13,11.1.10-h8
affected

10.2.0 (custom) before 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, 10.2.7-h34
affected

Timeline

2026-05-13:Initial publication.

Credits

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue. other

References

security.paloaltonetworks.com/CVE-2026-0259 vendor-advisory

cve.org (CVE-2026-0259)

nvd.nist.gov (CVE-2026-0259)

Download JSON