No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0236 |
|
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A code injection vulnerability in Palo Alto Networks Prisma® Browser on macOS fails to properly restrict access to its AppleScript interface allowing a locally authenticated non-admin user to leverage this exposed Apple Event handler to send unauthorized commands to the browser. | |
| Title | Prisma Browser: Code Injection Enables Security Controls Bypass | |
| First Time appeared |
Palo Alto Networks
Palo Alto Networks prisma Browser |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:palo_alto_networks:prisma_browser:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Palo Alto Networks
Palo Alto Networks prisma Browser |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2026-05-13T18:53:41.937Z
Reserved: 2025-11-03T20:43:57.172Z
Link: CVE-2026-0236
Updated: 2026-05-13T18:53:38.676Z
Status : Received
Published: 2026-05-13T19:16:57.183
Modified: 2026-05-13T19:16:57.183
Link: CVE-2026-0236
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z