Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Posted on July 16, 2025July 16, 2025 By CWS

Dozens of Fortinet FortiWeb situations have been compromised with webshells in a widespread hacking marketing campaign, in response to the menace monitoring group The Shadowserver Basis.

The assaults are linked to a crucial vulnerability, tracked as CVE-2025-25257, for which public proof-of-concept (PoC) exploits have been launched simply days in the past.

Key Takeaways1. A crucial flaw in Fortinet FortiWeb is being actively exploited by hackers.2. Attackers are utilizing public exploits to put in webshells and take management of gadgets.3. Dozens of programs are confirmed compromised; fast patching is important.

The Shadowserver Basis reported on Tuesday that it had recognized 77 compromised FortiWeb situations, a slight lower from 85 the day past. The group famous that lively exploitation of the vulnerability has been noticed since July 11, the identical day researchers made exploit code publicly out there.

We’re sharing Fortinet FortiWeb situations compromised with webshells probably by way of CVE-2025-25257. We see 77 circumstances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh. Tree map overview (compromised): pic.twitter.com/uhxApqKDPY— The Shadowserver Basis (@Shadowserver) July 16, 2025

The vulnerability on the coronary heart of those assaults, CVE-2025-25257, is a crucial pre-authenticated SQL injection (SQLi) flaw within the FortiWeb graphical consumer interface.

With a CVSS severity rating of 9.6 out of 10, the flaw permits unauthenticated attackers to execute unauthorized code or instructions remotely by sending specifically crafted HTTP requests.

Fortinet, a significant cybersecurity and firewall vendor, makes use of the FortiWeb equipment as a Internet Software Firewall (WAF) to guard net functions and APIs for giant enterprises and authorities companies.

Fortinet disclosed the vulnerability on July 8, 2025, and launched patches to deal with it. The flaw, found by safety researcher Kentaro Kawane of GMO Cybersecurity, resides within the FortiWeb Cloth Connector, a part that integrates the WAF with different Fortinet safety merchandise.

Nevertheless, on July 11, cybersecurity agency WatchTowr and one of many flaw’s co-discoverers printed PoC exploits, dramatically escalating the danger for organizations working unpatched variations.

The exploits demonstrated how an attacker might leverage SQL injection to plant a webshell or open a reverse shell on a weak system, granting them persistent entry and management.

The present wave of assaults confirms cybersecurity specialists’ fears that menace actors would rapidly weaponize the general public exploits. In keeping with Shadowserver, a further 223 FortiWeb administration interfaces remained uncovered to the web as of July 15.

We see 223 FortiWeb administration interfaces nonetheless uncovered on 2025-07-15 (no dedication of patch standing, but when unpatched for CVE-2025-25257 these are additionally all probably compromised).Tree map overview (publicity): pic.twitter.com/az8dlBP3Vt— The Shadowserver Basis (@Shadowserver) July 16, 2025

Whereas their patch standing is unconfirmed, these programs are thought of extremely more likely to be compromised in the event that they haven’t been up to date. The US has the very best variety of compromised gadgets at 40, adopted by the Netherlands, Singapore, and the UK.

Fortinet has urged clients to instantly improve to safe variations, together with FortiWeb 7.6.4, 7.4.8, 7.2.11, or 7.0.11 and later.

For organizations unable to use the patches straight away, the corporate recommends disabling the HTTP/HTTPS administrative interface as a brief workaround to dam the assault vector.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Exploits, Fortinet, FortiWeb, Hacked, Instances, PoC, Public, Webshells

Post navigation

Previous Post: MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials
Next Post: Top 3 CISO Challenges And How To Solve Them 

Related Posts

Blockchain Security – Protecting Decentralized Applications Cyber Security News
10 Best Secure Network As a Service for MSP Providers Cyber Security News
SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents Cyber Security News
LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access Cyber Security News
ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News