Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47890: Improper access control in Fortinet FortiOS

0
Low
VulnerabilityCVE-2025-47890cvecve-2025-47890
Published: Tue Oct 14 2025 (10/14/2025, 15:22:50 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An URL Redirection to Untrusted Site vulnerabilities [CWE-601] in FortiOS 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiProxy 7.6.0 through 7.6.3, 7.4 all versions, 7.2 all versions, 7.0 all versions; FortiSASE 25.2.a may allow an unauthenticated attacker to perform an open redirect attack via crafted HTTP requests.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:48:34 UTC

Technical Analysis

CVE-2025-47890 is a vulnerability categorized as an improper access control issue leading to an open redirect (CWE-601) in Fortinet's FortiOS, FortiProxy, and FortiSASE products. The affected versions include FortiOS 6.4.0 through 7.6.2, FortiProxy 7.0 through 7.6.3, and FortiSASE 25.2.a. The vulnerability allows an unauthenticated attacker to craft specially formed HTTP requests that cause the affected devices to redirect users to untrusted external websites. This redirection flaw can be exploited without authentication but requires user interaction, such as clicking a malicious link. The CVSS 3.1 base score is 2.5, reflecting low severity due to the attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), and requiring user interaction (UI:R). The impact is limited to integrity (I:L) with no confidentiality or availability impact. No known exploits have been reported in the wild as of the publication date. The vulnerability could be leveraged in phishing campaigns or social engineering attacks to redirect users to malicious sites, potentially leading to credential theft or malware infection. Fortinet devices are widely deployed in enterprise and service provider networks, making this vulnerability relevant for organizations relying on these products for network security and access control.

Potential Impact

For European organizations, the primary impact of CVE-2025-47890 is the potential facilitation of phishing or social engineering attacks through malicious URL redirection. While the vulnerability itself does not allow direct compromise of system confidentiality, integrity, or availability, it can be abused to redirect users to attacker-controlled sites that may host malware or credential harvesting pages. This risk is particularly relevant for organizations with large user bases accessing Fortinet portals or VPN gateways, where trust in URLs is critical. The low severity score indicates limited direct technical impact, but the indirect risk to user security and organizational reputation exists. Critical infrastructure sectors, government agencies, and enterprises with high reliance on Fortinet products for secure remote access could face increased exposure if attackers combine this vulnerability with other social engineering tactics. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

1. Monitor Fortinet's official advisories and apply patches or firmware updates as soon as they become available for the affected FortiOS, FortiProxy, and FortiSASE versions. 2. Implement strict URL filtering and web proxy controls to detect and block suspicious redirects or external links originating from Fortinet portals. 3. Educate users about the risks of clicking on unexpected links, especially those received via email or messaging platforms, to reduce the likelihood of successful phishing attacks leveraging this vulnerability. 4. Configure Fortinet devices to minimize exposure of web interfaces to untrusted networks, restricting access to trusted IP ranges where possible. 5. Enable logging and alerting on redirect-related events to identify potential exploitation attempts early. 6. Conduct regular security assessments and penetration tests focusing on web redirection and access control mechanisms within Fortinet products. 7. Consider deploying multi-factor authentication (MFA) on portals to reduce the risk of credential compromise if users are redirected to malicious sites.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-05-13T12:23:23.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e04035

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 10/21/2025, 4:48:34 PM

Last updated: 12/5/2025, 3:19:54 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats