Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-29183: Execute unauthorized code or commands in Fortinet FortiProxy

0
High
VulnerabilityCVE-2023-29183cvecve-2023-29183
Published: Wed Sep 13 2023 (09/13/2023, 12:29:55 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

CVE-2023-29183 is a high-severity cross-site scripting (XSS) vulnerability affecting Fortinet FortiProxy and FortiOS GUI versions 6. 2. 0 through 7. 2. 4. It allows an authenticated attacker with low privileges to execute arbitrary JavaScript code via crafted guest management settings, potentially compromising confidentiality, integrity, and availability. Exploitation requires user interaction but no administrative privileges. No known exploits are currently in the wild. European organizations using affected Fortinet products, especially in critical infrastructure and large enterprises, face significant risk. Mitigations include promptly applying vendor patches once available, restricting access to management interfaces, and implementing strict input validation and Content Security Policies.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:25:48 UTC

Technical Analysis

CVE-2023-29183 is a cross-site scripting (XSS) vulnerability identified in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, and FortiOS versions 6.2.0 through 7.2.4. The vulnerability arises from improper neutralization of input during web page generation in the GUI, specifically within the guest management settings. An authenticated attacker with low privileges can craft malicious input that, when rendered by the vulnerable GUI, executes arbitrary JavaScript code in the context of the victim's browser session. This can lead to theft of session tokens, unauthorized actions, or further exploitation within the network. The vulnerability requires the attacker to be authenticated and to trick a user into interacting with the malicious content (user interaction). The CVSS v3.1 base score is 7.3, indicating high severity due to the potential for complete compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits are currently known, the vulnerability's presence in widely deployed Fortinet products used for web proxying and security gateway functions makes it a significant concern. The vulnerability affects multiple major versions, indicating a broad attack surface. Fortinet has published advisories but patch links were not included in the provided data, suggesting organizations should monitor vendor updates closely. The vulnerability's exploitation could enable attackers to bypass security controls, escalate privileges, or move laterally within networks.

Potential Impact

For European organizations, the impact of CVE-2023-29183 is substantial due to the widespread use of Fortinet FortiProxy and FortiOS in enterprise and critical infrastructure environments. Successful exploitation can lead to unauthorized code execution within the management GUI, enabling attackers to hijack sessions, steal credentials, or manipulate configurations. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by potentially disrupting proxy or firewall services. Given Fortinet's role in securing network traffic, exploitation could facilitate further attacks such as data exfiltration or lateral movement. The requirement for authentication and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with many users or weak access controls. European organizations in sectors like finance, telecommunications, government, and energy are particularly at risk due to their reliance on Fortinet products for network security. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score necessitates urgent attention.

Mitigation Recommendations

1. Apply official patches from Fortinet immediately once available, as they will address the root cause of the XSS vulnerability. 2. Restrict access to FortiProxy and FortiOS management interfaces to trusted networks and users only, using network segmentation and VPNs. 3. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of unauthorized access. 4. Implement strict input validation and sanitization on all user inputs in the management GUI where possible. 5. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the management interface. 6. Monitor logs and network traffic for unusual activity related to management interface access or JavaScript injection attempts. 7. Educate administrators and users about phishing and social engineering risks that could facilitate user interaction required for exploitation. 8. Regularly audit and review user privileges to ensure least privilege principles are enforced. 9. Consider temporary disabling guest management features if not essential until patches are applied. 10. Maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2023-04-03T08:47:30.452Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194789050fe8508060cb7

Added to database: 12/16/2025, 5:18:48 PM

Last enriched: 12/23/2025, 6:25:48 PM

Last updated: 2/4/2026, 7:26:36 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats