Home

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

PUBLISHED Reserved 2025-01-08 | Published 2025-10-02 | Updated 2025-10-15 | Assigner fortinet




MEDIUM: 6.3CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C

Problem types

Escalation of privilege

Product status

Default status
unaffected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.5 (semver)
affected

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.6 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-385

cve.org (CVE-2025-22862)

nvd.nist.gov (CVE-2025-22862)

Download JSON