Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Posted on July 16, 2025July 16, 2025 By CWS

Dozens of Fortinet FortiWeb situations have been compromised with webshells in a widespread hacking marketing campaign, in response to the menace monitoring group The Shadowserver Basis.

The assaults are linked to a crucial vulnerability, tracked as CVE-2025-25257, for which public proof-of-concept (PoC) exploits have been launched simply days in the past.

Key Takeaways1. A crucial flaw in Fortinet FortiWeb is being actively exploited by hackers.2. Attackers are utilizing public exploits to put in webshells and take management of gadgets.3. Dozens of programs are confirmed compromised; fast patching is important.

The Shadowserver Basis reported on Tuesday that it had recognized 77 compromised FortiWeb situations, a slight lower from 85 the day past. The group famous that lively exploitation of the vulnerability has been noticed since July 11, the identical day researchers made exploit code publicly out there.

We’re sharing Fortinet FortiWeb situations compromised with webshells probably by way of CVE-2025-25257. We see 77 circumstances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh. Tree map overview (compromised): pic.twitter.com/uhxApqKDPY— The Shadowserver Basis (@Shadowserver) July 16, 2025

The vulnerability on the coronary heart of those assaults, CVE-2025-25257, is a crucial pre-authenticated SQL injection (SQLi) flaw within the FortiWeb graphical consumer interface.

With a CVSS severity rating of 9.6 out of 10, the flaw permits unauthenticated attackers to execute unauthorized code or instructions remotely by sending specifically crafted HTTP requests.

Fortinet, a significant cybersecurity and firewall vendor, makes use of the FortiWeb equipment as a Internet Software Firewall (WAF) to guard net functions and APIs for giant enterprises and authorities companies.

Fortinet disclosed the vulnerability on July 8, 2025, and launched patches to deal with it. The flaw, found by safety researcher Kentaro Kawane of GMO Cybersecurity, resides within the FortiWeb Cloth Connector, a part that integrates the WAF with different Fortinet safety merchandise.

Nevertheless, on July 11, cybersecurity agency WatchTowr and one of many flaw’s co-discoverers printed PoC exploits, dramatically escalating the danger for organizations working unpatched variations.

The exploits demonstrated how an attacker might leverage SQL injection to plant a webshell or open a reverse shell on a weak system, granting them persistent entry and management.

The present wave of assaults confirms cybersecurity specialists’ fears that menace actors would rapidly weaponize the general public exploits. In keeping with Shadowserver, a further 223 FortiWeb administration interfaces remained uncovered to the web as of July 15.

We see 223 FortiWeb administration interfaces nonetheless uncovered on 2025-07-15 (no dedication of patch standing, but when unpatched for CVE-2025-25257 these are additionally all probably compromised).Tree map overview (publicity): pic.twitter.com/az8dlBP3Vt— The Shadowserver Basis (@Shadowserver) July 16, 2025

Whereas their patch standing is unconfirmed, these programs are thought of extremely more likely to be compromised in the event that they haven’t been up to date. The US has the very best variety of compromised gadgets at 40, adopted by the Netherlands, Singapore, and the UK.

Fortinet has urged clients to instantly improve to safe variations, together with FortiWeb 7.6.4, 7.4.8, 7.2.11, or 7.0.11 and later.

For organizations unable to use the patches straight away, the corporate recommends disabling the HTTP/HTTPS administrative interface as a brief workaround to dam the assault vector.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Exploits, Fortinet, FortiWeb, Hacked, Instances, PoC, Public, Webshells

Post navigation

Previous Post: MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials
Next Post: Top 3 CISO Challenges And How To Solve Them 

Related Posts

Google Patches Android 0-Day Vulnerabilities Exploited in the Wild Cyber Security News
Microsoft 365 Exchange Online Outage Blocks Email on Outlook Mobile App Cyber Security News
DoorDash Confirms Data breach – Hackers Accessed Users Personal Data Cyber Security News
New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials Cyber Security News
Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Cyber Security News
Toys “R” Us Canada Confirms Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”
  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”
  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark