CVE-2026-0237 PUBLISHED

Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 14.05.2026

An improper protection of alternate path vulnerability in Palo Alto Networks Prisma® Browser on macOS fails to properly restrict access to an internal automation bridge. This allows a locally authenticated non-admin user to leverage an exposed communication channel to send unauthorized commands to the browser, bypassing security controls.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 7.3

Product Status

Vendor Palo Alto Networks
Product Prisma Browser
Versions Default: unaffected
  • affected from 0 to 146.16.6.165 (excl.)

Affected Configurations

No special configuration is required to be affected by this issue.

Exploits

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Credits

  • Cisors finder

References

Problem Types

  • CWE-424: Improper Protection of Alternate Path CWE

Impacts

  • CAPEC-121 Exploit Non-Production Interfaces