Reflected XSS vulnerability found in Palo Alto GlobalProtect Gateway & Portal. Attackers can inject malicious scripts via crafted requests. 
# CVE-2025-0133 Vulnerability Scanner
A Bash-based automated scanner tool for detecting the **CVE-2025-0133** Reflected XSS vulnerability in **Palo Alto GlobalProtect Gateway & Portal** using `nuclei` and `shodanx`.
---
**Author**:  
<p align="center">
  <a href="https://github.com/INTELEON404">
    <img title="Github" src="https://img.shields.io/badge/INTELEON404-red?style=for-the-badge&logo=github">
  </a>
</p>
**Date**: 2025-06-23  
**Severity**: Medium  
**CVE ID**: CVE-2025-0133  
**Vulnerability Type**: Reflected Cross-Site Scripting (XSS)  
**Tested Against**: Palo Alto Networks GlobalProtect Portal (PAN-OS)  
---
## Overview
This tool helps penetration testers and security researchers quickly identify vulnerable domains or IPs related to the CVE-2025-0133 issue.  
It leverages `nuclei` templates and Shodan query integration (`shodanx`) to find and scan targets efficiently.
---
## Features
- Automatically detects if input is a single domain or a file containing multiple domains/IPs  
- Runs `shodanx` on single domains to gather related hosts  
- Uses `nuclei` with a custom CVE-2025-0133 template to scan targets  
- Displays scan results in a clean tabular format on the command line  
- Shows scan start and end times  
- Prompts to save results in both `.txt` and `.json` formats  
- Built-in help and usage instructions
---
## Requirements
- Linux environment with Bash shell  
- [nuclei](https://nuclei.projectdiscovery.io/) installed and accessible in `$PATH`  
- [shodanx](https://github.com/RevoltSecurities/ShodanX)) installed and configured  
- The `CVE-2025-0133` nuclei template file located at:  
  `/home/user/nuclei-templates/http/cves/2025/CVE-2025-0133.yaml` (update path as needed)
  
## 📦 Required Tools Installation
### 🔹 1. Install [ShodanX](https://github.com/RevoltSecurities/ShodanX)
```bash
pip install git+https://github.com/RevoltSecurities/ShodanX 
```
>**If the error shows**: "error: externally-managed-environment"
```bash
pip inst