Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58324: Execute unauthorized code or commands in Fortinet FortiSIEM

0
Medium
VulnerabilityCVE-2025-58324cvecve-2025-58324
Published: Tue Oct 14 2025 (10/14/2025, 15:22:35 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSIEM

Description

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiSIEM 7.2.0 through 7.2.2, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions may allow an authenticated attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP requests.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:54:19 UTC

Technical Analysis

CVE-2025-58324 is a stored cross-site scripting (XSS) vulnerability identified in Fortinet's FortiSIEM product versions 6.2.0 through 7.2.2. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. An authenticated attacker with high privileges can craft malicious HTTP requests that inject persistent scripts into the FortiSIEM web interface. When other users or administrators access the affected pages, the malicious scripts execute in their browsers, potentially allowing unauthorized code or command execution within the context of the application. This can lead to session hijacking, privilege escalation, or manipulation of FortiSIEM data and operations. The vulnerability requires both authentication with high privileges and user interaction, which reduces the likelihood of remote exploitation by unauthenticated attackers. The CVSS 3.1 base score is 6.1, reflecting medium severity due to the combination of high impact on confidentiality, integrity, and availability, but mitigated by the attack complexity and required privileges. No public exploits or active exploitation in the wild have been reported as of the publication date (October 14, 2025). FortiSIEM is widely used for security information and event management, making this vulnerability significant for organizations relying on it for monitoring and incident response. The lack of patch links suggests that fixes may be pending or recently released, emphasizing the need for vigilance and timely updates.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity and confidentiality of security monitoring data and the availability of FortiSIEM services. Successful exploitation could allow attackers to execute unauthorized commands, manipulate security alerts, or disrupt monitoring capabilities, potentially masking malicious activities or causing operational downtime. This is particularly critical for sectors such as finance, energy, telecommunications, and government agencies that depend heavily on FortiSIEM for real-time security insights. The requirement for high-privilege authentication limits exposure but insider threats or compromised credentials could enable exploitation. Additionally, the stored XSS nature means that multiple users with access to the FortiSIEM interface could be affected once the malicious payload is injected. The impact extends beyond the affected system, as compromised FortiSIEM instances could undermine broader organizational security posture and incident response effectiveness.

Mitigation Recommendations

Organizations should immediately verify the FortiSIEM versions in use and plan to apply vendor-provided patches as soon as they become available. In the interim, restrict administrative and high-privilege access to trusted personnel only, and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Implement strict input validation and sanitization on all user inputs interacting with FortiSIEM interfaces. Deploy web application firewalls (WAFs) with rules designed to detect and block XSS attack patterns targeting FortiSIEM. Monitor logs and user activities for unusual behavior indicative of exploitation attempts. Conduct regular security awareness training to reduce risks from social engineering that could lead to credential compromise. Finally, segment FortiSIEM management interfaces from general network access to limit exposure to potential attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-08-28T09:14:58.078Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e04041

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 10/21/2025, 4:54:19 PM

Last updated: 12/3/2025, 5:52:18 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats