PT-2025-28847 · Fortinet · Fortiweb
0Xbigshaq
·
Published
2025-07-08
·
Updated
2025-09-25
·
CVE-2025-25257
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions**
Fortinet FortiWeb versions 7.0.0 through 7.6.3, 7.4.0 through 7.4.7, and 7.2.0 through 7.2.10
**Description**
Fortinet FortiWeb contains a SQL injection flaw (CWE-89) that allows unauthenticated attackers to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests. Exploitation of this vulnerability can lead to remote code execution (RCE). Public exploits are available, and active exploitation has been observed, with numerous systems already compromised. The vulnerability resides in the `get fabric user by token` function and is triggered by specially crafted input in the Authorization header when interacting with specific API endpoints. Attackers can leverage the `INTO OUTFILE` instruction in MySQL, combined with techniques like using the `UNHEX()` function and exploiting site-specific Python configurations, to achieve code execution. Approximately 20,000+ devices are estimated to be exposed.
**API Endpoints:** /api/fabric/device/status
**Vulnerable Parameters or Variables:** `Authorization` header
**Recommendations**
Update to FortiWeb version 7.6.4 or later.
Update to FortiWeb version 7.4.8 or later.
Update to FortiWeb version 7.2.11 or later.
Update to FortiWeb version 7.0.11 or later.
Exploit
Fix
RCE
SQL injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 269
- 🔥 https://github.com/0xbigshaq/CVE-2025-25257⭐ 43 🔗 11 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257?ref=labs.watchtowr.com⭐ 38 🔗 6 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257⭐ 26 🔗 4 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-25257 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-151 · Security Note, Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/723295 · Security Note
- https://bdu.fstec.ru/vul/2025-08439 · Security Note
- https://twitter.com/DefusedCyber/status/1957448853227028815 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1943758642232033396 · Twitter Post
- https://twitter.com/jackgoesvirtual/status/1943796488363991191 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1943731191036662156 · Twitter Post
- https://t.me/cybersecuritytechnologies/12152 · Telegram Post
- https://twitter.com/redtimmysec/status/1957366583161983008 · Twitter Post
- https://twitter.com/securityaffairs/status/1946607726894661719 · Twitter Post
- https://t.me/pentestingnews/64412 · Telegram Post