Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64446: Escalation of privilege in Fortinet FortiWeb

0
Critical
VulnerabilityCVE-2025-64446cvecve-2025-64446
Published: Fri Nov 14 2025 (11/14/2025, 15:50:52 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 11/21/2025, 16:47:27 UTC

Technical Analysis

CVE-2025-64446 is a critical escalation of privilege vulnerability affecting multiple versions of Fortinet FortiWeb, a web application firewall product widely used to protect web applications. The vulnerability arises from a relative path traversal flaw that can be triggered by specially crafted HTTP or HTTPS requests. By exploiting this flaw, an unauthenticated attacker can traverse directories on the FortiWeb system and execute administrative commands, effectively gaining full control over the device. This bypasses normal authentication and authorization mechanisms, allowing attackers to manipulate the system configuration, disable protections, or pivot into the protected network. The vulnerability affects FortiWeb versions 7.0.0 through 8.0.1, covering several major releases. The CVSS v3.1 base score of 9.4 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The exploitability is high, and the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but is severe. Although no public exploits are currently reported, the critical nature and ease of exploitation make this a high-risk vulnerability. Fortinet has published the vulnerability details but has not yet released patches at the time of this report, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, the impact of CVE-2025-64446 is substantial. FortiWeb is commonly deployed in enterprise and government environments to secure web-facing applications, making it a high-value target. Successful exploitation can lead to complete compromise of the FortiWeb appliance, allowing attackers to disable security controls, intercept or modify web traffic, and potentially gain further access to internal networks. This threatens the confidentiality of sensitive data, the integrity of web applications, and the availability of critical services. Sectors such as finance, healthcare, telecommunications, and public administration are particularly at risk due to their reliance on FortiWeb for regulatory compliance and security. The ability to execute administrative commands without authentication increases the risk of widespread disruption and data breaches. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying its impact across European critical infrastructure and private sector organizations.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Immediately identify all FortiWeb appliances running affected versions (7.0.0 through 8.0.1) via asset inventories and network scans. 2) Apply vendor patches or updates as soon as they become available to remediate the vulnerability. 3) Until patches are deployed, implement strict network segmentation to isolate FortiWeb devices from untrusted networks and limit management interface exposure. 4) Employ web application firewall logging and intrusion detection systems to monitor for unusual HTTP/HTTPS requests indicative of path traversal attempts. 5) Use access control lists (ACLs) and firewall rules to restrict access to FortiWeb management interfaces to trusted IP addresses only. 6) Conduct regular security audits and vulnerability assessments focusing on FortiWeb configurations. 7) Educate security teams about this vulnerability to ensure rapid detection and response. 8) Consider deploying additional compensating controls such as multi-factor authentication for administrative access and enhanced monitoring of administrative command execution logs. These measures will reduce the attack surface and limit the potential for exploitation until a full patch can be applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-11-04T14:26:34.042Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691753bf7ba9501c4c978725

Added to database: 11/14/2025, 4:07:27 PM

Last enriched: 11/21/2025, 4:47:27 PM

Last updated: 12/30/2025, 8:29:05 AM

Views: 177

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats