Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks

CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks

Posted on July 19, 2025July 19, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a crucial Fortinet FortiWeb vulnerability to its Recognized Exploited Vulnerabilities (KEV) catalog, confirming lively exploitation of the SQL injection flaw in cyberattacks worldwide.

The vulnerability, tracked as CVE-2025-25257, impacts Fortinet’s FortiWeb net software firewall and carries a extreme CVSS rating of 9.6 out of 10.

The vulnerability arises from improper neutralization of particular components utilized in SQL instructions, permitting unauthenticated attackers to execute unauthorized SQL code or instructions by way of crafted HTTP or HTTPS requests.

“An improper neutralization of particular components utilized in an SQL command (‘SQL Injection’) vulnerability [CWE-89] in FortiWeb might enable an unauthenticated attacker to execute unauthorized SQL code or instructions by way of crafted HTTP or HTTPs requests,” Fortinet defined in its advisory.

The vulnerability resides in FortiWeb’s Material Connector element, which serves as a bridge between the firewall and different Fortinet safety merchandise.

Safety researchers found that attackers can exploit the flaw by sending malicious requests to the /api/cloth/system/standing endpoint with crafted Authorization headers.

Lively Exploitation Marketing campaign

Cybersecurity monitoring group The Shadowserver Basis has recognized widespread exploitation of the vulnerability, reporting 77 compromised FortiWeb situations as of July 15, 2025. This represents a slight lower from 85 compromised techniques detected the day prior to this.

We’re sharing Fortinet FortiWeb situations compromised with webshells seemingly by way of CVE-2025-25257. We see 77 instances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh. Tree map overview (compromised): pic.twitter.com/uhxApqKDPY— The Shadowserver Basis (@Shadowserver) July 16, 2025

The exploitation marketing campaign started on July 11, 2025, coinciding with the general public launch of proof-of-concept exploit code by safety researchers at watchTowr Labs. This speedy weaponization demonstrates how shortly risk actors can leverage publicly out there exploits.

“We see 77 instances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh,” The Shadowserver Basis reported.

The assaults contain deploying webshells on compromised techniques, offering persistent backdoor entry for attackers. America accounts for the very best variety of compromised units at 40, adopted by the Netherlands, Singapore, and the UK.

A number of FortiWeb variations are susceptible to the assault:

VersionAffectedSolutionFortiWeb 7.67.6.0 by means of 7.6.3Upgrade to 7.6.4 or aboveFortiWeb 7.47.4.0 by means of 7.4.7Upgrade to 7.4.8 or aboveFortiWeb 7.27.2.0 by means of 7.2.10Upgrade to 7.2.11 or aboveFortiWeb 7.07.0.0 by means of 7.0.10Upgrade to 7.0.11 or above

Fortinet launched safety patches on July 8, 2025, and confirmed on July 18 that the vulnerability “has been noticed to be exploited within the wild on FortiWeb”.

CISA strongly urges all organizations to prioritize remediation of this vulnerability, noting that “these kind of vulnerabilities are frequent assault vectors for malicious cyber actors and pose vital dangers to the federal enterprise”.

For organizations unable to instantly patch, Fortinet recommends disabling the HTTP/HTTPS administrative interface as a brief workaround. Moreover, 223 FortiWeb administration interfaces stay uncovered on-line, creating potential targets for additional compromise6.

The vulnerability was responsibly disclosed by Kentaro Kawane from GMO Cybersecurity by Ierae. Safety consultants emphasize the crucial significance of speedy patch deployment, particularly for internet-facing safety home equipment that function main defensive boundaries in opposition to cyber threats.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attacks, CISA, Exploited, Fortinet, FortiWeb, Injection, SQL, Vulnerability, Warns

Post navigation

Previous Post: How to Prevent Social Engineering Attacks
Next Post: Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs

Related Posts

FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests Cyber Security News
PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request Cyber Security News
Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Cyber Security News
Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports Cyber Security News
How Prompt Injection Attacks Bypassing AI Agents With Users Input How Prompt Injection Attacks Bypassing AI Agents With Users Input Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark