CVE-2025-46760
AI Analysis
Technical Summary
CVE-2025-46760 is a vulnerability entry that has been reserved but subsequently marked as REJECTED, indicating that the CVE identifier was assigned but the vulnerability was either not confirmed, not valid, or otherwise withdrawn from the CVE list. There is no detailed description, no vendor or product information, no affected versions, and no technical details beyond the reservation date and the assigner (Fortinet). Additionally, there are no known exploits in the wild, no patches, and no CWE classification. The absence of a CVSS score and the REJECTED state strongly suggest that this is not an active or confirmed vulnerability. Without concrete technical details, it is impossible to analyze the nature of the vulnerability, its attack vector, or its impact. The lack of information means that this entry does not represent a current or credible threat to systems or organizations.
Potential Impact
Given the REJECTED status and lack of technical details, there is no evidence that CVE-2025-46760 poses any risk or impact to European organizations or any other entities. No known exploits or affected products exist, so no confidentiality, integrity, or availability concerns can be attributed to this CVE. Therefore, it does not represent a threat to operational security, data protection, or business continuity within Europe or elsewhere.
Mitigation Recommendations
Since CVE-2025-46760 is a rejected and unconfirmed vulnerability with no known affected products or exploits, no specific mitigation actions are necessary. Organizations should continue to follow standard cybersecurity best practices, including maintaining up-to-date software, applying patches for confirmed vulnerabilities, and monitoring threat intelligence sources for validated threats. No targeted mitigation or remediation is warranted for this CVE entry.
CVE-2025-46760
AI-Powered Analysis
Technical Analysis
CVE-2025-46760 is a vulnerability entry that has been reserved but subsequently marked as REJECTED, indicating that the CVE identifier was assigned but the vulnerability was either not confirmed, not valid, or otherwise withdrawn from the CVE list. There is no detailed description, no vendor or product information, no affected versions, and no technical details beyond the reservation date and the assigner (Fortinet). Additionally, there are no known exploits in the wild, no patches, and no CWE classification. The absence of a CVSS score and the REJECTED state strongly suggest that this is not an active or confirmed vulnerability. Without concrete technical details, it is impossible to analyze the nature of the vulnerability, its attack vector, or its impact. The lack of information means that this entry does not represent a current or credible threat to systems or organizations.
Potential Impact
Given the REJECTED status and lack of technical details, there is no evidence that CVE-2025-46760 poses any risk or impact to European organizations or any other entities. No known exploits or affected products exist, so no confidentiality, integrity, or availability concerns can be attributed to this CVE. Therefore, it does not represent a threat to operational security, data protection, or business continuity within Europe or elsewhere.
Mitigation Recommendations
Since CVE-2025-46760 is a rejected and unconfirmed vulnerability with no known affected products or exploits, no specific mitigation actions are necessary. Organizations should continue to follow standard cybersecurity best practices, including maintaining up-to-date software, applying patches for confirmed vulnerabilities, and monitoring threat intelligence sources for validated threats. No targeted mitigation or remediation is warranted for this CVE entry.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-04-29T00:20:46.509Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- REJECTED
Threat ID: 682d983dc4522896dcbef2c2
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 10:21:30 PM
Last updated: 2/7/2026, 6:49:33 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.