Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47890: Improper access control in Fortinet FortiOS

0
Low
VulnerabilityCVE-2025-47890cvecve-2025-47890
Published: Tue Oct 14 2025 (10/14/2025, 15:22:50 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An URL Redirection to Untrusted Site vulnerabilities [CWE-601] in FortiOS 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiProxy 7.6.0 through 7.6.3, 7.4 all versions, 7.2 all versions, 7.0 all versions; FortiSASE 25.2.a may allow an unauthenticated attacker to perform an open redirect attack via crafted HTTP requests.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:48:02 UTC

Technical Analysis

CVE-2025-47890 is an improper access control vulnerability categorized as an open redirect (CWE-601) affecting Fortinet's FortiOS, FortiProxy, and FortiSASE products across multiple versions, including FortiOS 6.4.0 through 7.6.2, FortiProxy 7.0 through 7.6.3, and FortiSASE 25.2.a. The flaw allows an unauthenticated attacker to send specially crafted HTTP requests that cause the affected device to redirect users to arbitrary external URLs. This can be exploited to facilitate phishing attacks, redirect users to malicious websites, or bypass certain security controls by leveraging trusted Fortinet domains. The vulnerability does not directly compromise confidentiality, integrity, or availability of the device or network but poses a risk to end-user trust and may be used as part of a broader attack chain. The CVSS v3.1 score is 2.5 (low), reflecting that exploitation requires user interaction, has high attack complexity, and no privileges are needed. No known active exploits have been reported. The vulnerability affects a broad range of Fortinet products widely deployed in enterprise and service provider environments, making it relevant for organizations relying on Fortinet security appliances for perimeter defense and secure access.

Potential Impact

For European organizations, the primary impact of CVE-2025-47890 lies in the potential for social engineering and phishing attacks leveraging trusted Fortinet domains to redirect users to malicious sites. This can erode user trust, potentially lead to credential theft, or facilitate malware delivery. While the vulnerability does not allow direct compromise of network devices or data exfiltration, it can be a stepping stone for attackers targeting employees or customers. Organizations in sectors with high reliance on Fortinet products for secure remote access, such as finance, healthcare, and critical infrastructure, may face increased risk. The widespread deployment of Fortinet products across Europe means that many organizations could be exposed, especially those that have not yet updated to patched versions. However, the low severity and requirement for user interaction limit the overall risk to operational continuity and data confidentiality.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor Fortinet vendor advisories and apply security patches promptly once released for affected FortiOS, FortiProxy, and FortiSASE versions. 2) Implement strict URL filtering and web gateway controls to detect and block suspicious redirect URLs originating from Fortinet devices. 3) Educate users about the risks of clicking on unexpected links, especially those appearing to come from trusted Fortinet domains. 4) Review and harden Fortinet device configurations to limit exposure of web interfaces to untrusted networks. 5) Employ multi-factor authentication and endpoint protection to reduce the impact of potential phishing attacks facilitated by this vulnerability. 6) Conduct regular security assessments and penetration tests focusing on open redirect and phishing vectors. 7) Use network monitoring tools to detect anomalous HTTP redirect patterns that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-05-13T12:23:23.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e04035

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 10/14/2025, 3:48:02 PM

Last updated: 10/16/2025, 12:15:33 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats