PT-2025-46973 · Fortinet · Fortiweb
Published
2025-11-14
·
Updated
2025-11-20
·
CVE-2025-64446
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiWeb versions 7.0.0 through 8.0.1
Fortinet FortiWeb versions 7.2.0 through 7.2.11
Fortinet FortiWeb versions 7.4.0 through 7.4.9
Fortinet FortiWeb versions 7.6.0 through 7.6.4
Description
Fortinet FortiWeb is affected by a relative path traversal vulnerability that allows attackers to execute administrative commands on the system via crafted HTTP or HTTPS requests. This vulnerability is actively exploited in the wild, with reports of a proof-of-concept exploit tool being released on GitHub. Attackers can bypass authentication and create administrative user accounts, potentially gaining full control over the web management panel and WebSocket CLI. The vulnerability is related to errors in the handling of relative file paths within the CGI components of FortiWeb. Exploitation involves sending specifically crafted requests to the
/api/v2.0/cmdb/system/admin/../../../../../cgi-bin/fwbcgi endpoint. Hundreds of vulnerable devices have been identified online, and the vulnerability is being actively exploited by threat actors. The vulnerability has a CVSS score of 9.1 or 9.8 depending on the source.Recommendations
Fortinet FortiWeb versions 7.0.0 through 7.0.11: Apply the latest security updates as soon as possible.
Fortinet FortiWeb versions 7.2.0 through 7.2.11: Apply the latest security updates as soon as possible.
Fortinet FortiWeb versions 7.4.0 through 7.4.9: Apply the latest security updates as soon as possible.
Fortinet FortiWeb versions 7.6.0 through 7.6.4: Apply the latest security updates as soon as possible.
Fortinet FortiWeb versions 8.0.0 through 8.0.1: Upgrade to version 8.0.2 or later.
As a temporary workaround, block requests to the
/api/v.. paths containing directory traversal attempts (../).
Monitor for and review recently created user accounts for any suspicious activity.
Check for access to the /fwbcgi endpoint from external networks.Exploit
Fix
LPE
RCE
Relative Path Traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-14084
CVE-2025-64446
Affected Products
Fortiweb
References · 134
- 🔥 https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-64446/8.0.0⭐ 166 🔗 59 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-Fortiweb-AuthBypass⭐ 26 🔗 4 · Exploit
- 🔥 https://patreon.com/posts/cve-2025-64446-8-143791801 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-64446 · Security Note
- https://fortiguard.com/psirt/FG-IR-25-910 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-910 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-14084 · Security Note
- https://t.me/CSIRT_italia/2911 · Telegram Post
- https://twitter.com/f1tym1/status/1989429286508400985 · Twitter Post
- https://twitter.com/pcasano/status/1990910411080876343 · Twitter Post
- https://twitter.com/FarVisionNetwks/status/1990787722408337629 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1oxozj7/top_10_trending_cves_15112025 · Reddit Post
- https://t.me/cveNotify/142899 · Telegram Post
- https://twitter.com/vuln_tracker/status/1989582848261554363 · Twitter Post
- https://t.me/proxy_bar/2878 · Telegram Post