CVE-2026-0236 PUBLISHED

Prisma Browser: Code Injection Enables Security Controls Bypass

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 13.05.2026

A code injection vulnerability in Palo Alto Networks Prisma® Browser on macOS fails to properly restrict access to its AppleScript interface allowing a locally authenticated non-admin user to leverage this exposed Apple Event handler to send unauthorized commands to the browser.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 7.3

Product Status

Vendor Palo Alto Networks
Product Prisma Browser
Versions Default: unaffected
  • affected from 0 to 146.16.6.165 (excl.)

Affected Configurations

No special configuration is required to be affected by this issue.

Exploits

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Credits

  • Cisors finder

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE

Impacts

  • CAPEC-242 Code Injection