Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58324: Execute unauthorized code or commands in Fortinet FortiSIEM

0
Medium
VulnerabilityCVE-2025-58324cvecve-2025-58324
Published: Tue Oct 14 2025 (10/14/2025, 15:22:35 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSIEM

Description

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiSIEM 7.2.0 through 7.2.2, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions may allow an authenticated attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP requests.

AI-Powered Analysis

AILast updated: 01/14/2026, 23:24:49 UTC

Technical Analysis

CVE-2025-58324 is a stored cross-site scripting (XSS) vulnerability identified in Fortinet's FortiSIEM product, affecting versions 6.2.0 through 7.2.2. The root cause is improper neutralization of input during web page generation, classified under CWE-79. An authenticated attacker with high privileges can craft malicious HTTP requests that inject persistent scripts into the FortiSIEM web interface. When other users or administrators access the affected pages, the malicious scripts execute in their browsers, potentially allowing the attacker to execute unauthorized code or commands within the context of the victim's session. This can lead to theft of session tokens, privilege escalation, or manipulation of the FortiSIEM environment, impacting confidentiality, integrity, and availability of security monitoring data. The vulnerability requires both authentication with elevated privileges and user interaction, which reduces the likelihood of widespread exploitation but does not eliminate risk. The CVSS v3.1 score of 6.1 reflects medium severity, with network attack vector, high attack complexity, and partial user interaction. No public exploits have been reported yet, but the vulnerability's presence in widely deployed versions of FortiSIEM makes it a significant concern for organizations relying on this platform for security event management and incident response.

Potential Impact

For European organizations, exploitation of this vulnerability could compromise the integrity and confidentiality of security event data managed by FortiSIEM, potentially allowing attackers to manipulate alerts, hide malicious activity, or gain unauthorized access to sensitive operational information. This undermines the effectiveness of security monitoring and incident response, increasing the risk of undetected breaches. Availability could also be affected if attackers disrupt FortiSIEM functionality. Organizations in sectors such as finance, energy, telecommunications, and government—where FortiSIEM is commonly deployed—face heightened risk due to the critical nature of their security operations. The requirement for authenticated access with high privileges somewhat limits exposure but also highlights the importance of protecting administrative credentials. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR and other European data protection laws if security monitoring is compromised.

Mitigation Recommendations

1. Apply official patches or updates from Fortinet as soon as they become available to address the input neutralization flaw. 2. Restrict administrative and high-privilege access to FortiSIEM interfaces using network segmentation, VPNs, and multi-factor authentication to reduce the risk of credential compromise. 3. Conduct regular audits of user accounts and permissions to ensure least privilege principles are enforced. 4. Implement web application firewalls (WAF) with rules designed to detect and block XSS payloads targeting FortiSIEM. 5. Monitor FortiSIEM logs and network traffic for unusual activity indicative of attempted exploitation or unauthorized script execution. 6. Educate administrators on the risks of XSS and safe handling of web interfaces. 7. Consider deploying Content Security Policy (CSP) headers if configurable within FortiSIEM to mitigate impact of injected scripts. 8. Maintain an incident response plan that includes procedures for handling potential compromise of security monitoring tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-08-28T09:14:58.078Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e04041

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 1/14/2026, 11:24:49 PM

Last updated: 1/19/2026, 7:51:14 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats