Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication

Posted on July 18, 2025July 18, 2025 By CWS

Hackers began concentrating on a just lately patched critical-severity vulnerability in Fortinet FortiWeb on the identical day that proof-of-concept (PoC) exploit code was shared publicly.

Tracked as CVE-2025-25257 (CVSS rating of 9.6), the flaw is described as an SQL injection challenge that permits unauthenticated attackers to run unauthorized SQL code or instructions by way of crafted HTTP or HTTPS requests.  

Fortinet launched fixes for the safety defect on July 8, crediting Kentaro Kawane from GMO Cybersecurity by Ierae for reporting it.

FortiWeb variations 7.6.4, 7.4.8, 7.2.11, and seven.0.11 include the mandatory patches and customers are suggested to replace as quickly as attainable, or to disable the HTTP/HTTPS administrative interface if patching is just not attainable.

On July 11, watchTowr Labs printed technical data on the bug, explaining that it resides in a perform that fails to correctly sanitize consumer enter.

After dissecting the difficulty, the researchers demonstrated that it may very well be exploited to write down a python (.pth) file into the server’s site-packages listing, which led to distant code execution (RCE).

Whereas Fortinet made no point out of the bug being exploited within the wild on July 8, the primary exploitation makes an attempt have been noticed on July 11, instantly after watchTowr’s weblog submit and PoC exploit.

The Shadowserver Basis on Thursday noticed 35 FortiWeb situations on which webshells had been planted, apparently via the exploitation of CVE-2025-25257. The quantity has dropped from 85 compromised deployments seen on July 14.Commercial. Scroll to proceed studying.

In accordance with Censys, there are over 20,000 internet-accessible FortiWeb home equipment, albeit a lot of them don’t look like instantly uncovered. It’s unclear what number of of those are susceptible, as Censys couldn’t infer their model data.

Given the continued exploitation of the vulnerability and the place FortiWeb has within the community – it’s used to connect with and handle units within the Fortinet ecosystem – customers are suggested to replace their deployments urgently.

Associated: Fortinet, Ivanti Patch Excessive-Severity Vulnerabilities

Associated: Fortinet Patches Zero-Day Exploited In opposition to FortiVoice Home equipment

Associated: Risk Actor Allegedly Promoting Fortinet Firewall Zero-Day Exploit

Associated: Fortinet Patches Crucial FortiSwitch Vulnerability

Security Week News Tags:Exploited, Flaw, Fortinet, FortiWeb, PoC, Publication, Wild

Post navigation

Previous Post: 1.4 Million Affected by Data Breach at Virginia Radiology Practice
Next Post: CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

Related Posts

Ivanti, Fortinet, Splunk Release Security Updates Ivanti, Fortinet, Splunk Release Security Updates Security Week News
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Apono Raises  Million for Cloud Identity Management Platform Apono Raises $34 Million for Cloud Identity Management Platform Security Week News
DOJ Antitrust Review Clears Google’s  Billion Acquisition of Wiz DOJ Antitrust Review Clears Google’s $32 Billion Acquisition of Wiz Security Week News
1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium Security Week News
Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News