PT-2025-46973 · Fortinet · Fortiweb
Published
2025-11-14
·
Updated
2026-02-21
·
CVE-2025-64446
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiWeb versions 7.0.0 through 8.0.1
Fortinet FortiWeb versions 7.2.0 through 7.2.11
Fortinet FortiWeb versions 7.4.0 through 7.4.9
Fortinet FortiWeb versions 7.6.0 through 7.6.4
Description
Fortinet FortiWeb contains a relative path traversal vulnerability that may allow a remote, unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. This vulnerability allows attackers to bypass authentication and potentially gain full administrative control over the WAF. Exploitation has been observed in the wild, with reports indicating the vulnerability is being actively exploited to create malicious administrative accounts, alter configurations, and potentially steal sensitive information. Hundreds of vulnerable devices have been identified online, and the vulnerability is being actively discussed and exploited by threat actors. The vulnerability is related to improper input validation in the handling of file paths, specifically within the
cgi auth() and cgi process() functions. Attackers can leverage this flaw to access restricted resources and execute arbitrary commands.Recommendations
Fortinet FortiWeb versions 7.0.0 through 7.0.11: Apply the latest security patches immediately.
Fortinet FortiWeb versions 7.2.0 through 7.2.11: Apply the latest security patches immediately.
Fortinet FortiWeb versions 7.4.0 through 7.4.9: Apply the latest security patches immediately.
Fortinet FortiWeb versions 7.6.0 through 7.6.4: Apply the latest security patches immediately.
Fortinet FortiWeb versions 8.0.0 through 8.0.1: Upgrade to version 8.0.2 or later.
Review admin activity logs for any suspicious or unauthorized access attempts.
Disable HTTP/HTTPS on internet-facing interfaces if patching is not immediately feasible.
Implement strict network segmentation to limit the potential impact of a successful exploit.
Exploit
Fix
LPE
RCE
Relative Path Traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-14084
CVE-2025-64446
Affected Products
Fortiweb
References · 191
- 🔥 https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-64446/8.0.0⭐ 166 🔗 59 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-Fortiweb-AuthBypass⭐ 26 🔗 4 · Exploit
- 🔥 https://patreon.com/posts/cve-2025-64446-8-143791801 · Exploit
- https://bdu.fstec.ru/vul/2025-14084 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-910 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-64446 · Security Note
- https://fortiguard.com/psirt/FG-IR-25-910 · Security Note
- https://twitter.com/blackorbird/status/2004137586353230078 · Twitter Post
- https://t.me/true_secator/7640 · Telegram Post
- https://reddit.com/r/u_MotasemHa/comments/1pb8glv/the_fortiweb_firewall_vulnerability_cve202564446 · Reddit Post
- https://reddit.com/r/secithubcommunity/comments/1pcxxxf/rapid7_critical_fortiweb_flaws_also_hit · Reddit Post
- https://twitter.com/qualys/status/1989520502956659023 · Twitter Post
- https://runzero.com/blog/fortinet-fortiweb · Reddit Post
- https://twitter.com/Cyberciaforge/status/2014565542884213187 · Twitter Post
- https://twitter.com/ManMotasem/status/1995420403104202978 · Twitter Post