PT-2025-28847 · Fortinet · Fortiweb
Published
2025-07-08
·
Updated
2025-07-17
·
CVE-2025-25257
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Fortinet FortiWeb versions 7.0.0 through 7.6.3
Fortinet FortiWeb versions 7.2.0 through 7.2.10
Fortinet FortiWeb versions 7.4.0 through 7.4.7
**Description:**
Fortinet FortiWeb is affected by a critical SQL injection vulnerability in the `get fabric user by token` function of the Fabric Connector component. This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands via crafted HTTP or HTTPS requests, potentially leading to remote code execution (RCE). The vulnerability is triggered by improper neutralization of special elements in an SQL command. Exploitation involves sending malicious input through the `Authorization` header to specific API endpoints, such as `/api/fabric/device/status`. Attackers can leverage this vulnerability to execute commands on the system, potentially deploying webshells. Public exploits are available, and active exploitation has been observed, with approximately 223 vulnerable instances identified.
**Recommendations:**
Fortinet FortiWeb versions 7.0.0 through 7.0.10: Update to version 7.0.11 or later.
Fortinet FortiWeb versions 7.2.0 through 7.2.10: Update to version 7.2.11 or later.
Fortinet FortiWeb versions 7.4.0 through 7.4.7: Update to version 7.4.8 or later.
Fortinet FortiWeb versions 7.6.0 through 7.6.3: Update to version 7.6.4 or later.
Exploit
Fix
SQL injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 170
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257?ref=labs.watchtowr.com⭐ 38 🔗 6 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257⭐ 26 🔗 4 · Exploit
- https://bdu.fstec.ru/vul/2025-08439 · Security Note
- https://twitter.com/cybertzar/status/1944764197981639133 · Twitter Post
- https://t.me/c/2147616733/880 · Telegram Post
- https://twitter.com/7h3h4ckv157/status/1944814967632626015 · Twitter Post
- https://twitter.com/davidpereiracib/status/1943753589912219984 · Twitter Post
- https://twitter.com/catnap707/status/1944553529718505553 · Twitter Post
- https://t.me/c/1233397458/64412 · Telegram Post
- https://twitter.com/Shadowserver/status/1945407662805454871 · Twitter Post
- https://twitter.com/AdliceSoftware/status/1943704348241842657 · Twitter Post
- https://twitter.com/moton/status/1944599299289133466 · Twitter Post
- https://t.me/c/1137382253/10038 · Telegram Post
- https://twitter.com/jackgoesvirtual/status/1943796488363991191 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1lw8z1z/top_10_trending_cves_10072025 · Reddit Post