Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58324: Execute unauthorized code or commands in Fortinet FortiSIEM

0
Medium
VulnerabilityCVE-2025-58324cvecve-2025-58324
Published: Tue Oct 14 2025 (10/14/2025, 15:22:35 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSIEM

Description

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiSIEM 7.2.0 through 7.2.2, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions may allow an authenticated attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:52:54 UTC

Technical Analysis

CVE-2025-58324 is a stored cross-site scripting (XSS) vulnerability identified in Fortinet's FortiSIEM product across versions 6.2.0 through 7.2.2. The root cause is improper neutralization of input during web page generation, which allows an authenticated attacker with high privileges to inject malicious scripts via crafted HTTP requests. This vulnerability falls under CWE-79, indicating a failure to sanitize input that is later rendered in web pages. The attack requires the attacker to be authenticated with elevated privileges and involves user interaction to trigger the malicious script execution. Successful exploitation can lead to unauthorized code or command execution within the context of the FortiSIEM web interface, potentially allowing attackers to manipulate monitoring data, escalate privileges, or disrupt security operations. The CVSS v3.1 base score is 6.1, reflecting medium severity, with attack vector being network-based but requiring high attack complexity and privileges. No public exploits or active exploitation have been reported to date. FortiSIEM is a security information and event management (SIEM) solution widely used by enterprises and service providers to monitor and manage security events, making this vulnerability significant in environments relying on Fortinet for security monitoring.

Potential Impact

The impact of CVE-2025-58324 is substantial for organizations using FortiSIEM as it can compromise the confidentiality, integrity, and availability of security monitoring data and operations. An attacker exploiting this vulnerability could execute unauthorized scripts that may alter or disable security alerts, manipulate logs, or gain further access within the FortiSIEM environment. This undermines the trustworthiness of security event data and could delay or prevent detection of other attacks. Given FortiSIEM’s role in centralized security management, exploitation could have cascading effects on an organization’s overall security posture. Although exploitation requires authenticated access with high privileges, insider threats or compromised credentials could facilitate attacks. The medium CVSS score reflects these factors, but the potential for significant operational disruption and data compromise elevates the risk for critical infrastructure and large enterprises relying on FortiSIEM.

Mitigation Recommendations

To mitigate CVE-2025-58324, organizations should implement the following specific measures: 1) Apply vendor-provided patches or updates as soon as they become available to address the input validation flaw. 2) Restrict administrative and high-privilege access to FortiSIEM interfaces using strong authentication mechanisms such as multi-factor authentication (MFA) and least privilege principles. 3) Conduct thorough input validation and sanitization on all user-supplied data within FortiSIEM customizations or integrations to prevent injection of malicious scripts. 4) Monitor FortiSIEM logs for unusual activity or signs of attempted XSS exploitation, including unexpected HTTP requests or script injections. 5) Segment FortiSIEM management interfaces from general user networks to reduce exposure. 6) Educate administrators and users about the risks of phishing or social engineering that could lead to credential compromise. 7) Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules tuned to detect and block XSS payloads targeting FortiSIEM. These targeted controls go beyond generic advice by focusing on the specific attack vector and environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-08-28T09:14:58.078Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e04041

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 2/27/2026, 3:52:54 AM

Last updated: 3/23/2026, 2:48:47 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses