PT-2025-46973 · Fortinet · Fortiweb
Published
2025-11-14
·
Updated
2025-12-07
·
CVE-2025-64446
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiWeb versions 7.0.0 through 8.0.1
Fortinet FortiWeb versions 7.2.0 through 7.2.11
Fortinet FortiWeb versions 7.4.0 through 7.4.9
Fortinet FortiWeb versions 7.6.0 through 7.6.4
Description
Fortinet FortiWeb contains a relative path traversal vulnerability that may allow a remote, unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. This vulnerability is actively exploited in the wild, with reports of exploitation attempts observed since early October. Attackers can bypass authentication and create administrative accounts, potentially gaining full control of the web application firewall. Hundreds of vulnerable devices have been identified online. The vulnerability involves improper input validation and allows attackers to traverse directories and execute arbitrary code. Exploitation involves sending crafted requests to the
/api/v2.0/cmdb/system/admin/../../../../../cgi-bin/fwbcgi endpoint.Recommendations
Fortinet FortiWeb versions prior to 8.0.2 are affected. Upgrade to version 8.0.2 or later to address this vulnerability.
As a temporary workaround, restrict access to the
/api/v2.0/cmdb/system/admin/../../../../../cgi-bin/fwbcgi endpoint.
Review system logs for any suspicious activity related to administrative account creation or modification.
Disable HTTP/HTTPS on internet-facing interfaces if patching is not immediately possible.Exploit
Fix
RCE
LPE
Relative Path Traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-14084
CVE-2025-64446
Affected Products
Fortiweb
References · 176
- 🔥 https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-64446/8.0.0⭐ 166 🔗 59 · Exploit
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-Fortiweb-AuthBypass⭐ 26 🔗 4 · Exploit
- 🔥 https://patreon.com/posts/cve-2025-64446-8-143791801 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-64446 · Security Note
- https://bdu.fstec.ru/vul/2025-14084 · Security Note
- https://fortiguard.com/psirt/FG-IR-25-910 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-910 · Vendor Advisory
- https://t.me/cveNotify/143358 · Telegram Post
- https://twitter.com/HackingTeam777/status/1992191884312125604 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1993244271151857711 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1p4k1tl/top_10_trending_cves_23112025 · Reddit Post
- https://twitter.com/Hawley/status/1990815010910593158 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1oyizts/top_10_trending_cves_16112025 · Reddit Post
- https://twitter.com/dansantanna/status/1990466833321955809 · Twitter Post
- https://twitter.com/blackwired32799/status/1991627615124291763 · Twitter Post