Home

Description

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

PUBLISHED Reserved 2025-11-04 | Published 2025-11-14 | Updated 2025-11-15 | Assigner fortinet




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

CISA Known Exploited Vulnerability

Date added 2025-11-14 | Due date 2025-11-21

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

Escalation of privilege

Product status

Default status
unaffected

8.0.0 (semver)
affected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-64446 government-resource

github.com/watchtowrlabs/watchTowr-vs-Fortiweb-AuthBypass exploit

fortiguard.fortinet.com/psirt/FG-IR-25-910

cve.org (CVE-2025-64446)

nvd.nist.gov (CVE-2025-64446)

Download JSON