Description
An arbitrary File Read and Delete Vulnerability in Palo Alto Networks WildFire® WF-500 and WF-500-B appliances enables users to read sensitive information and delete arbitrary files. This vulnerability affects WF-500 and WF-500-B appliances running in the default non-FIPS configuration mode. The WildFire Appliance (WF-500, WF-500-B) software update is now available to customers that use the WildFire Appliance (WF-500, WF-500-B) for on-premise sandboxing. Please note that customers using the WildFire Public cloud service are NOT impacted by this vulnerability.
Problem types
CWE-73 External Control of File Name or Path
Product status
12.1.0 (custom) before 12.1.7, 12.1.4-h5
11.2.0 (custom) before 11.2.11,11.2.7-h7
11.1.0 (custom) before 11.1.13,11.1.10-h8
10.2.0 (custom) before 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, 10.2.7-h34
Timeline
| 2026-05-13: | Initial publication. |
Credits
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.
References
security.paloaltonetworks.com/CVE-2026-0259