Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64446: Escalation of privilege in Fortinet FortiWeb

0
Critical
VulnerabilityCVE-2025-64446cvecve-2025-64446
Published: Fri Nov 14 2025 (11/14/2025, 15:50:52 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 11/14/2025, 16:22:21 UTC

Technical Analysis

CVE-2025-64446 is a critical security vulnerability affecting Fortinet FortiWeb versions 7.0.0 through 8.0.1. The vulnerability arises from a relative path traversal flaw that can be triggered by an attacker sending specially crafted HTTP or HTTPS requests to the FortiWeb appliance. This flaw allows the attacker to bypass normal access controls and execute administrative commands on the underlying system without any authentication or user interaction. The vulnerability impacts the confidentiality, integrity, and availability of the affected system, as an attacker can gain full administrative control, potentially leading to data theft, service disruption, or further network compromise. The CVSS v3.1 base score of 9.1 indicates critical severity, with attack vector being network-based, no privileges required, and no user interaction needed. The vulnerability affects multiple major FortiWeb releases, including 7.0.x, 7.2.x, 7.4.x, 7.6.x, and 8.0.x series, which are widely deployed in enterprise environments for web application firewalling and application delivery. Although no public exploits have been reported yet, the flaw's nature and ease of exploitation make it a prime target for attackers once exploit code becomes available. Fortinet has not yet published official patches or mitigation instructions at the time of this report, increasing the urgency for organizations to implement interim protective measures.

Potential Impact

For European organizations, the impact of CVE-2025-64446 can be severe. FortiWeb appliances are commonly used to protect critical web applications and infrastructure, including government portals, financial services, healthcare systems, and telecommunications. Successful exploitation could lead to unauthorized administrative access, allowing attackers to manipulate web traffic, steal sensitive data, disrupt services, or pivot into internal networks. This could result in significant operational downtime, regulatory non-compliance (e.g., GDPR breaches), financial losses, and reputational damage. The vulnerability's network-based attack vector and lack of required authentication mean attackers can exploit it remotely with minimal effort. Given Europe's strong regulatory environment and reliance on secure web infrastructure, the threat poses a high risk to both private and public sector entities. Additionally, critical infrastructure operators and large enterprises using FortiWeb appliances are particularly vulnerable to targeted attacks leveraging this flaw.

Mitigation Recommendations

1. Immediate deployment of official patches from Fortinet once available is the most effective mitigation. 2. Until patches are released, implement strict network segmentation to isolate FortiWeb appliances from untrusted networks and restrict management interfaces to trusted IP addresses only. 3. Deploy Web Application Firewall (WAF) rules or Intrusion Prevention System (IPS) signatures to detect and block suspicious HTTP/HTTPS requests indicative of path traversal attempts. 4. Enable detailed logging and continuous monitoring on FortiWeb devices to identify anomalous administrative command executions or unusual request patterns. 5. Conduct regular vulnerability scanning and penetration testing focused on FortiWeb appliances to identify potential exploitation attempts. 6. Limit administrative access to FortiWeb devices using multi-factor authentication and role-based access controls to reduce impact if compromise occurs. 7. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving FortiWeb compromise. 8. Consider deploying network-level protections such as application-layer gateways or reverse proxies to add an additional layer of filtering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-11-04T14:26:34.042Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691753bf7ba9501c4c978725

Added to database: 11/14/2025, 4:07:27 PM

Last enriched: 11/14/2025, 4:22:21 PM

Last updated: 11/15/2025, 7:31:14 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats