Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Posted on July 16, 2025July 16, 2025 By CWS

Dozens of Fortinet FortiWeb situations have been compromised with webshells in a widespread hacking marketing campaign, in response to the menace monitoring group The Shadowserver Basis.

The assaults are linked to a crucial vulnerability, tracked as CVE-2025-25257, for which public proof-of-concept (PoC) exploits have been launched simply days in the past.

Key Takeaways1. A crucial flaw in Fortinet FortiWeb is being actively exploited by hackers.2. Attackers are utilizing public exploits to put in webshells and take management of gadgets.3. Dozens of programs are confirmed compromised; fast patching is important.

The Shadowserver Basis reported on Tuesday that it had recognized 77 compromised FortiWeb situations, a slight lower from 85 the day past. The group famous that lively exploitation of the vulnerability has been noticed since July 11, the identical day researchers made exploit code publicly out there.

We’re sharing Fortinet FortiWeb situations compromised with webshells probably by way of CVE-2025-25257. We see 77 circumstances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh. Tree map overview (compromised): pic.twitter.com/uhxApqKDPY— The Shadowserver Basis (@Shadowserver) July 16, 2025

The vulnerability on the coronary heart of those assaults, CVE-2025-25257, is a crucial pre-authenticated SQL injection (SQLi) flaw within the FortiWeb graphical consumer interface.

With a CVSS severity rating of 9.6 out of 10, the flaw permits unauthenticated attackers to execute unauthorized code or instructions remotely by sending specifically crafted HTTP requests.

Fortinet, a significant cybersecurity and firewall vendor, makes use of the FortiWeb equipment as a Internet Software Firewall (WAF) to guard net functions and APIs for giant enterprises and authorities companies.

Fortinet disclosed the vulnerability on July 8, 2025, and launched patches to deal with it. The flaw, found by safety researcher Kentaro Kawane of GMO Cybersecurity, resides within the FortiWeb Cloth Connector, a part that integrates the WAF with different Fortinet safety merchandise.

Nevertheless, on July 11, cybersecurity agency WatchTowr and one of many flaw’s co-discoverers printed PoC exploits, dramatically escalating the danger for organizations working unpatched variations.

The exploits demonstrated how an attacker might leverage SQL injection to plant a webshell or open a reverse shell on a weak system, granting them persistent entry and management.

The present wave of assaults confirms cybersecurity specialists’ fears that menace actors would rapidly weaponize the general public exploits. In keeping with Shadowserver, a further 223 FortiWeb administration interfaces remained uncovered to the web as of July 15.

We see 223 FortiWeb administration interfaces nonetheless uncovered on 2025-07-15 (no dedication of patch standing, but when unpatched for CVE-2025-25257 these are additionally all probably compromised).Tree map overview (publicity): pic.twitter.com/az8dlBP3Vt— The Shadowserver Basis (@Shadowserver) July 16, 2025

Whereas their patch standing is unconfirmed, these programs are thought of extremely more likely to be compromised in the event that they haven’t been up to date. The US has the very best variety of compromised gadgets at 40, adopted by the Netherlands, Singapore, and the UK.

Fortinet has urged clients to instantly improve to safe variations, together with FortiWeb 7.6.4, 7.4.8, 7.2.11, or 7.0.11 and later.

For organizations unable to use the patches straight away, the corporate recommends disabling the HTTP/HTTPS administrative interface as a brief workaround to dam the assault vector.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Exploits, Fortinet, FortiWeb, Hacked, Instances, PoC, Public, Webshells

Post navigation

Previous Post: MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials
Next Post: Top 3 CISO Challenges And How To Solve Them 

Related Posts

Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Cyber Security News
Quantum Threats Preparing Your Encryption Strategy Cyber Security News
20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News