Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code

Posted on July 9, 2025July 9, 2025 By CWS

A essential safety vulnerability has been found in FortiWeb net software firewalls that permits unauthenticated attackers to execute unauthorized SQL instructions by means of specifically crafted HTTP and HTTPS requests. 

This vulnerability, categorized as CWE-89 (Improper Neutralization of Particular Parts utilized in an SQL Command), represents a major risk to organizations counting on FortiWeb for net software safety. 

Key Takeaways1. Vital FortiWeb flaw, CVE-2025-25257, lets attackers run malicious SQL through crafted requests.2. Impacts FortiWeb 7.0–7.6 (varied sub-versions); improve now.3. Exploitation can compromise information and system safety.4. Patch instantly and disable admin interfaces as a precaution.

The vulnerability has been assigned CVE-2025-25257 and carries a CVSS v3 rating of 9.6, indicating its essential severity stage.

FortiWeb SQL Injection Vulnerability

The FortiWeb SQL injection vulnerability originates from the product’s GUI element’s improper enter validation mechanisms. 

Attackers can exploit this flaw by sending malicious HTTP or HTTPS requests containing specifically crafted SQL payloads that bypass the applying’s safety controls. 

The vulnerability permits for SQL injection assaults the place malicious SQL code is injected into database queries, doubtlessly enabling attackers to learn, modify, or delete delicate information saved within the backend database.

The technical classification as CWE-89 signifies that the vulnerability happens when consumer enter isn’t correctly sanitized earlier than being integrated into SQL queries. 

This basic safety weak point permits attackers to govern database operations by injecting malicious SQL instructions by means of net requests. 

The truth that unauthenticated attackers can exploit this vulnerability considerably amplifies its danger profile, as no prior system entry or credentials are required to launch assaults.

Threat FactorsDetailsAffected ProductsFortiWeb 7.6.0–7.6.3FortiWeb 7.4.0–7.4.7FortiWeb 7.2.0–7.2.10FortiWeb 7.0.0–7.0.10ImpactExecute unauthorized code or commandsExploit PrerequisitesNone (Unauthenticated, distant attacker)CVSS 3.1 Score9.6 (Vital)

The vulnerability impacts a number of FortiWeb variations throughout completely different launch branches. FortiWeb 7.6 variations 7.6.0 by means of 7.6.3 are susceptible and require upgrading to 7.6.4 or above. 

FortiWeb 7.4 variations 7.4.0 by means of 7.4.7 want upgrading to 7.4.8 or above. FortiWeb 7.2 variations 7.2.0 by means of 7.2.10 require upgrading to 7.2.11 or above, whereas FortiWeb 7.0 variations 7.0.0 by means of 7.0.10 want upgrading to 7.0.11 or above.

The influence of profitable exploitation consists of the power to execute unauthorized code or instructions on affected techniques. 

This might result in full system compromise, information exfiltration, service disruption, or lateral motion throughout the community infrastructure.

Organizations ought to instantly improve their FortiWeb installations to the patched variations specified for every affected department. 

As an interim workaround, directors can disable the HTTP/HTTPS administrative interface to scale back the assault floor till patching is accomplished.

The vulnerability was responsibly disclosed by Kentaro Kawane from GMO Cybersecurity by Ierae, highlighting the significance of coordinated vulnerability disclosure processes. 

Organizations ought to implement extra safety measures resembling community segmentation, entry controls, and steady monitoring to detect potential exploitation makes an attempt whereas patches are being deployed.

Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Attacker, Code, Execute, FortiWeb, Injection, Malicious, SQL, Vulnerability

Post navigation

Previous Post: Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking
Next Post: Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges

Related Posts

Developers Beware of npm Phishing Email That Steal Your Login Credentials Cyber Security News
China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users Cyber Security News
Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections Cyber Security News
North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City
  • CISA Warns of Spyware Targeting Messaging App Users
  • AI Agent Security Firm Vijil Raises $17 Million
  • Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams
  • Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City
  • CISA Warns of Spyware Targeting Messaging App Users
  • AI Agent Security Firm Vijil Raises $17 Million
  • Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams
  • Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark