PT-2025-46973 · Fortinet · Fortiweb
Published
2025-11-14
·
Updated
2026-04-18
·
CVE-2025-64446
CVSS v2.0
10
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Fortinet FortiWeb versions 7.0.0 through 8.0.1
Description:
A relative path traversal vulnerability exists in Fortinet FortiWeb versions 7.0.0 through 8.0.1. This flaw allows an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. The vulnerability involves bypassing authentication and potentially gaining full administrative control. Active exploitation of this vulnerability has been observed, with reports indicating it has been exploited in the wild since early October. Hundreds of vulnerable devices have been identified online, and the vulnerability is being actively discussed and exploited in cybersecurity communities. The vulnerability allows attackers to create new administrative accounts, potentially leading to full system compromise. The vulnerability is related to improper handling of file paths and can be exploited by sending specially crafted requests to the
/api/v2.0/cmdb/system/admin endpoint. The vulnerability has been assigned a CVSS score of 9.1.Recommendations:
Update FortiWeb to version 8.0.2 or later. If an immediate update is not possible, restrict access to the affected API endpoints. Review system logs for any suspicious activity. Monitor for exploit attempts using honeypots. Disable HTTP/HTTPS on internet-facing interfaces as a temporary mitigation.
Exploit
Fix
LPE
RCE
Relative Path Traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Fortiweb