Home

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2 all versions, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

PUBLISHED Reserved 2025-01-08 | Published 2025-10-02 | Updated 2025-10-03 | Assigner fortinet




MEDIUM: 6.3CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C

Problem types

Escalation of privilege

Product status

Default status
unaffected

7.6.0
affected

7.4.0
affected

7.2.0
affected

7.0.5
affected

Default status
unaffected

7.4.0
affected

7.2.0
affected

7.0.6
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-385

cve.org (CVE-2025-22862)

nvd.nist.gov (CVE-2025-22862)

Download JSON