PT-2025-47361 · Fortinet · Fortiweb
Published
2025-11-18
·
Updated
2026-02-21
·
CVE-2025-58034
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiWeb versions 7.0.0 through 8.0.1
Fortinet FortiWeb versions 7.2.0 through 7.2.11
Fortinet FortiWeb versions 7.4.0 through 7.4.10
Fortinet FortiWeb versions 7.6.0 through 7.6.5
Description
Fortinet FortiWeb is affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. This allows an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. The vulnerability is actively exploited in the wild, and CISA has added it to its Known Exploited Vulnerabilities (KEV) Catalog. Approximately 1.5k instances are exposed. Successful exploitation could lead to full system control, data breaches, and ransomware attacks. The vulnerability exists due to insufficient input validation, allowing attackers to inject arbitrary commands into the system. The
policy scripting post handler component is implicated in the vulnerability.Recommendations
Fortinet FortiWeb versions 7.0.0 through 7.0.11: Apply the latest available patch.
Fortinet FortiWeb versions 7.2.0 through 7.2.11: Apply the latest available patch.
Fortinet FortiWeb versions 7.4.0 through 7.4.10: Apply the latest available patch.
Fortinet FortiWeb versions 7.6.0 through 7.6.5: Apply the latest available patch.
Fortinet FortiWeb versions 8.0.0 through 8.0.1: Apply the latest available patch.
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-14466
CVE-2025-58034
ZDI-25-1014
Affected Products
Fortiweb
References · 118
- https://bdu.fstec.ru/vul/2025-14466 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-1014 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-58034 · Security Note
- https://twitter.com/Komodosec/status/2004583542110769379 · Twitter Post
- https://twitter.com/transilienceai/status/1993197087882698827 · Twitter Post
- https://twitter.com/CCBalert/status/1993683837914615911 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1991186332257796232 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1pswxeg/top_10_trending_cves_22122025 · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1p17374/bugs_caught_in_the_fortiweb_active_attacks_target · Reddit Post
- https://t.me/cveNotify/143633 · Telegram Post
- https://twitter.com/cyberpinnacleuk/status/1995760763772756157 · Twitter Post
- https://twitter.com/PurpleOps_io/status/1991054237099262313 · Twitter Post
- https://twitter.com/jackgoesvirtual/status/1992302017784770565 · Twitter Post
- https://twitter.com/securityaffairs/status/1991454864426275158 · Twitter Post
- https://twitter.com/hackplayers/status/1991048823511175647 · Twitter Post