Reflected XSS vulnerability found in Palo Alto GlobalProtect Gateway & Portal. Attackers can inject malicious scripts via crafted requests.
# CVE-2025-0133 Vulnerability Scanner
A Bash-based automated scanner tool for detecting the **CVE-2025-0133** Reflected XSS vulnerability in **Palo Alto GlobalProtect Gateway & Portal** using `nuclei` and `shodanx`.
---
**Author**:
<p align="center">
<a href="https://github.com/INTELEON404">
<img title="Github" src="https://img.shields.io/badge/INTELEON404-red?style=for-the-badge&logo=github">
</a>
</p>
**Date**: 2025-06-23
**Severity**: Medium
**CVE ID**: CVE-2025-0133
**Vulnerability Type**: Reflected Cross-Site Scripting (XSS)
**Tested Against**: Palo Alto Networks GlobalProtect Portal (PAN-OS)
---
## Overview
This tool helps penetration testers and security researchers quickly identify vulnerable domains or IPs related to the CVE-2025-0133 issue.
It leverages `nuclei` templates and Shodan query integration (`shodanx`) to find and scan targets efficiently.
---
## Features
- Automatically detects if input is a single domain or a file containing multiple domains/IPs
- Runs `shodanx` on single domains to gather related hosts
- Uses `nuclei` with a custom CVE-2025-0133 template to scan targets
- Displays scan results in a clean tabular format on the command line
- Shows scan start and end times
- Prompts to save results in both `.txt` and `.json` formats
- Built-in help and usage instructions
---
## Requirements
- Linux environment with Bash shell
- [nuclei](https://nuclei.projectdiscovery.io/) installed and accessible in `$PATH`
- [shodanx](https://github.com/RevoltSecurities/ShodanX)) installed and configured
- The `CVE-2025-0133` nuclei template file located at:
`/home/user/nuclei-templates/http/cves/2025/CVE-2025-0133.yaml` (update path as needed)
## 📦 Required Tools Installation
### 🔹 1. Install [ShodanX](https://github.com/RevoltSecurities/ShodanX)
```bash
pip install git+https://github.com/RevoltSecurities/ShodanX
```
>**If the error shows**: "error: externally-managed-environment"
```bash
pip inst