A essential safety vulnerability has been found in FortiWeb net software firewalls that permits unauthenticated attackers to execute unauthorized SQL instructions by means of specifically crafted HTTP and HTTPS requests.
This vulnerability, categorized as CWE-89 (Improper Neutralization of Particular Parts utilized in an SQL Command), represents a major risk to organizations counting on FortiWeb for net software safety.
Key Takeaways1. Vital FortiWeb flaw, CVE-2025-25257, lets attackers run malicious SQL through crafted requests.2. Impacts FortiWeb 7.0–7.6 (varied sub-versions); improve now.3. Exploitation can compromise information and system safety.4. Patch instantly and disable admin interfaces as a precaution.
The vulnerability has been assigned CVE-2025-25257 and carries a CVSS v3 rating of 9.6, indicating its essential severity stage.
FortiWeb SQL Injection Vulnerability
The FortiWeb SQL injection vulnerability originates from the product’s GUI element’s improper enter validation mechanisms.
Attackers can exploit this flaw by sending malicious HTTP or HTTPS requests containing specifically crafted SQL payloads that bypass the applying’s safety controls.
The vulnerability permits for SQL injection assaults the place malicious SQL code is injected into database queries, doubtlessly enabling attackers to learn, modify, or delete delicate information saved within the backend database.
The technical classification as CWE-89 signifies that the vulnerability happens when consumer enter isn’t correctly sanitized earlier than being integrated into SQL queries.
This basic safety weak point permits attackers to govern database operations by injecting malicious SQL instructions by means of net requests.
The truth that unauthenticated attackers can exploit this vulnerability considerably amplifies its danger profile, as no prior system entry or credentials are required to launch assaults.
Threat FactorsDetailsAffected ProductsFortiWeb 7.6.0–7.6.3FortiWeb 7.4.0–7.4.7FortiWeb 7.2.0–7.2.10FortiWeb 7.0.0–7.0.10ImpactExecute unauthorized code or commandsExploit PrerequisitesNone (Unauthenticated, distant attacker)CVSS 3.1 Score9.6 (Vital)
The vulnerability impacts a number of FortiWeb variations throughout completely different launch branches. FortiWeb 7.6 variations 7.6.0 by means of 7.6.3 are susceptible and require upgrading to 7.6.4 or above.
FortiWeb 7.4 variations 7.4.0 by means of 7.4.7 want upgrading to 7.4.8 or above. FortiWeb 7.2 variations 7.2.0 by means of 7.2.10 require upgrading to 7.2.11 or above, whereas FortiWeb 7.0 variations 7.0.0 by means of 7.0.10 want upgrading to 7.0.11 or above.
The influence of profitable exploitation consists of the power to execute unauthorized code or instructions on affected techniques.
This might result in full system compromise, information exfiltration, service disruption, or lateral motion throughout the community infrastructure.
Organizations ought to instantly improve their FortiWeb installations to the patched variations specified for every affected department.
As an interim workaround, directors can disable the HTTP/HTTPS administrative interface to scale back the assault floor till patching is accomplished.
The vulnerability was responsibly disclosed by Kentaro Kawane from GMO Cybersecurity by Ierae, highlighting the significance of coordinated vulnerability disclosure processes.
Organizations ought to implement extra safety measures resembling community segmentation, entry controls, and steady monitoring to detect potential exploitation makes an attempt whereas patches are being deployed.
Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now