Palo Alto has released a security update to fix multiple vulnerabilities across the Palo Alto Networks Expedition previously known as (Migration Tool)

 

The addressed vulnerabilities could allow the remote attacker to conduct reflected XSS attacks by executing malicious JavaScript code in the context on the affected systems, and obtain sensitive information revealing Expedition database contents, such as password hashes, usernames, device configurations, and device API keys.

Sample of the addressed vulnerabilities:

Palo Alto Networks Expedition SQL injection Vulnerability (CVE-2025-0103):

  • CVSS v4.0: 7.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Obtain Information

It should be highlighted that Expedition is designed to only be used temporarily for migration purposes, not to be run in production. Additionally, Expedition reached its End of Life (EOL) date on December 31, 2024.

Vulnerabilities
  •  CVE-2025-0103
  • CVE-2025-0104
  • CVE-2025-0105
  • CVE-2025-0106
  • CVE-2025-0107
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Palo Alto Security Advisory

References