CVE-2025-61624: Escalation of privilege in Fortinet FortiOS
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands.
AI Analysis
Technical Summary
This vulnerability (CVE-2025-61624) is an improper limitation of a pathname to a restricted directory (path traversal) affecting Fortinet FortiOS versions 6.4.0 through 7.6.4, FortiPAM versions 1.0 through 1.7.0, FortiProxy versions 7.0 through 7.6.4, and FortiSwitchManager versions 7.0.0 through 7.2.7. It allows an authenticated attacker with admin privileges and at least read-write access to execute specific CLI commands that can write or delete arbitrary files on the affected system. The vulnerability is officially fixed by Fortinet, and patches are available.
Potential Impact
Exploitation of this vulnerability allows an authenticated administrator-level user to write or delete arbitrary files on the affected Fortinet devices. This can lead to unauthorized modification or deletion of critical system files, potentially impacting system integrity and availability. There is no indication of confidentiality impact. No known exploits in the wild have been reported at this time.
Mitigation Recommendations
An official fix is available from Fortinet for this vulnerability. It is recommended to apply the vendor-provided patches promptly to affected versions of FortiOS, FortiPAM, FortiProxy, and FortiSwitchManager. Since the vulnerability requires authenticated admin-level access, ensure that administrative credentials are well protected and access is limited to trusted personnel.
CVE-2025-61624: Escalation of privilege in Fortinet FortiOS
Description
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2025-61624) is an improper limitation of a pathname to a restricted directory (path traversal) affecting Fortinet FortiOS versions 6.4.0 through 7.6.4, FortiPAM versions 1.0 through 1.7.0, FortiProxy versions 7.0 through 7.6.4, and FortiSwitchManager versions 7.0.0 through 7.2.7. It allows an authenticated attacker with admin privileges and at least read-write access to execute specific CLI commands that can write or delete arbitrary files on the affected system. The vulnerability is officially fixed by Fortinet, and patches are available.
Potential Impact
Exploitation of this vulnerability allows an authenticated administrator-level user to write or delete arbitrary files on the affected Fortinet devices. This can lead to unauthorized modification or deletion of critical system files, potentially impacting system integrity and availability. There is no indication of confidentiality impact. No known exploits in the wild have been reported at this time.
Mitigation Recommendations
An official fix is available from Fortinet for this vulnerability. It is recommended to apply the vendor-provided patches promptly to affected versions of FortiOS, FortiPAM, FortiProxy, and FortiSwitchManager. Since the vulnerability requires authenticated admin-level access, ensure that administrative credentials are well protected and access is limited to trusted personnel.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-29T07:36:48.603Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- official-fix
Threat ID: 69de650582d89c981fbed4df
Added to database: 4/14/2026, 4:02:13 PM
Last enriched: 4/14/2026, 4:18:30 PM
Last updated: 4/15/2026, 6:07:40 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.