PT-2025-28847 · Fortinet · Fortiweb
0Xbigshaq
·
Published
2025-07-08
·
Updated
2026-03-04
·
CVE-2025-25257
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiWeb versions 7.0.0 through 7.6.3
Fortinet FortiWeb versions 7.4.0 through 7.4.7
Fortinet FortiWeb versions 7.2.0 through 7.2.10
Description
Fortinet FortiWeb contains an improper neutralization of special elements used in an SQL command vulnerability (CWE-89). This vulnerability allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests. Exploitation involves sending specially crafted requests to the
/api/fabric/device/status endpoint, potentially leading to remote code execution. Public exploits are available, and active exploitation has been observed, with numerous systems already compromised. Attackers are utilizing various techniques, including the use of hex-encoded payloads and the exploitation of a Python feature to execute malicious code. Approximately 20,000 devices are estimated to be exposed. Multiple actors are actively exploiting this vulnerability.Recommendations
Fortinet FortiWeb versions 7.0.0 through 7.0.10: Update to version 7.0.11 or later.
Fortinet FortiWeb versions 7.2.0 through 7.2.10: Update to version 7.2.11 or later.
Fortinet FortiWeb versions 7.4.0 through 7.4.7: Update to version 7.4.8 or later.
Fortinet FortiWeb versions 7.6.0 through 7.6.3: Update to version 7.6.4 or later.
Exploit
Fix
RCE
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-08439
CVE-2025-25257
Affected Products
Fortiweb
References · 298
- 🔥 https://github.com/0xbigshaq/CVE-2025-25257⭐ 43 🔗 11 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257?ref=labs.watchtowr.com⭐ 38 🔗 6 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257⭐ 26 🔗 4 · Exploit
- 🔥 https://exploit-db.com/exploits/52473 · Exploit
- 🔥 https://packetstorm.news/files/id/210193 · Exploit
- https://bdu.fstec.ru/vul/2025-08439 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-25257 · Security Note
- https://t.me/cveNotify/152596 · Telegram Post
- https://twitter.com/itgather/status/1949675587884429679 · Twitter Post
- https://twitter.com/MeridianEU/status/1989360164034805934 · Twitter Post
- https://twitter.com/PoC_in_Github/status/1946647782384922753 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1945596496247734395 · Twitter Post
- https://twitter.com/cybertzar/status/1944764197981639133 · Twitter Post
- https://twitter.com/Threadmark_IT/status/1943938879712899343 · Twitter Post
- https://twitter.com/DefusedCyber/status/1960243618985267353 · Twitter Post