Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22862: Escalation of privilege in Fortinet FortiProxy

0
Medium
VulnerabilityCVE-2025-22862cvecve-2025-22862
Published: Thu Oct 02 2025 (10/02/2025, 12:48:41 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:54:03 UTC

Technical Analysis

CVE-2025-22862 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet FortiProxy and FortiOS products across multiple versions (7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, and 7.0.5 and above). The vulnerability arises from improper handling of Webhook actions within the Automation Stitch component, which is designed to automate security workflows. An attacker who is already authenticated with high privileges can exploit this flaw by triggering a malicious Webhook action, effectively bypassing intended authentication controls and escalating their privileges further. This escalation can lead to full compromise of the device, impacting confidentiality, integrity, and availability. The vulnerability requires no user interaction but does require the attacker to have some level of authenticated access, limiting the attack surface to insiders or compromised accounts. The CVSS v3.1 score of 6.3 reflects a medium severity, considering the attack vector is local (AV:L), with low attack complexity (AC:L), but requiring high privileges (PR:H). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits have been reported yet, but the potential for misuse in targeted attacks exists. The vulnerability was reserved in January 2025 and published in October 2025, indicating recent discovery and disclosure. Fortinet has not provided patch links in the data, so organizations should monitor Fortinet advisories for updates and mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those relying on Fortinet FortiProxy and FortiOS for network security and proxy services. Successful exploitation could allow attackers with existing authenticated access to escalate privileges, potentially gaining full control over the affected devices. This could lead to interception or manipulation of network traffic, disruption of services, and exposure of sensitive data. Critical infrastructure sectors such as finance, energy, telecommunications, and government agencies that deploy Fortinet products extensively could face operational disruptions and data breaches. The requirement for authenticated access somewhat limits the threat to insiders or attackers who have already compromised credentials, but the high impact on confidentiality, integrity, and availability means that even limited exploitation could have severe consequences. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits post-disclosure. Organizations in Europe should consider this vulnerability a priority for patching and configuration review to prevent privilege escalation attacks that could undermine their security posture.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation approach: 1) Immediately monitor Fortinet's official security advisories for patches addressing CVE-2025-22862 and apply them promptly once available. 2) Restrict access to the Automation Stitch component and Webhook configurations to the minimum necessary administrative users to reduce the attack surface. 3) Audit and review all existing Automation Stitch workflows and Webhook actions for suspicious or unauthorized configurations that could be exploited. 4) Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise leading to authenticated access. 5) Monitor logs and network traffic for unusual Webhook activity or privilege escalation attempts. 6) Employ network segmentation to isolate FortiProxy and FortiOS management interfaces from general user networks. 7) Conduct regular security awareness training for administrators to recognize and report suspicious activities. 8) Prepare incident response plans specifically addressing potential exploitation of privilege escalation vulnerabilities in network security devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-08T09:38:22.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68de786dd3ffb1ecf5acc7f5

Added to database: 10/2/2025, 1:04:45 PM

Last enriched: 1/14/2026, 2:54:03 PM

Last updated: 2/7/2026, 6:33:50 AM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats