Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code

Posted on July 9, 2025July 9, 2025 By CWS

A essential safety vulnerability has been found in FortiWeb net software firewalls that permits unauthenticated attackers to execute unauthorized SQL instructions by means of specifically crafted HTTP and HTTPS requests. 

This vulnerability, categorized as CWE-89 (Improper Neutralization of Particular Parts utilized in an SQL Command), represents a major risk to organizations counting on FortiWeb for net software safety. 

Key Takeaways1. Vital FortiWeb flaw, CVE-2025-25257, lets attackers run malicious SQL through crafted requests.2. Impacts FortiWeb 7.0–7.6 (varied sub-versions); improve now.3. Exploitation can compromise information and system safety.4. Patch instantly and disable admin interfaces as a precaution.

The vulnerability has been assigned CVE-2025-25257 and carries a CVSS v3 rating of 9.6, indicating its essential severity stage.

FortiWeb SQL Injection Vulnerability

The FortiWeb SQL injection vulnerability originates from the product’s GUI element’s improper enter validation mechanisms. 

Attackers can exploit this flaw by sending malicious HTTP or HTTPS requests containing specifically crafted SQL payloads that bypass the applying’s safety controls. 

The vulnerability permits for SQL injection assaults the place malicious SQL code is injected into database queries, doubtlessly enabling attackers to learn, modify, or delete delicate information saved within the backend database.

The technical classification as CWE-89 signifies that the vulnerability happens when consumer enter isn’t correctly sanitized earlier than being integrated into SQL queries. 

This basic safety weak point permits attackers to govern database operations by injecting malicious SQL instructions by means of net requests. 

The truth that unauthenticated attackers can exploit this vulnerability considerably amplifies its danger profile, as no prior system entry or credentials are required to launch assaults.

Threat FactorsDetailsAffected ProductsFortiWeb 7.6.0–7.6.3FortiWeb 7.4.0–7.4.7FortiWeb 7.2.0–7.2.10FortiWeb 7.0.0–7.0.10ImpactExecute unauthorized code or commandsExploit PrerequisitesNone (Unauthenticated, distant attacker)CVSS 3.1 Score9.6 (Vital)

The vulnerability impacts a number of FortiWeb variations throughout completely different launch branches. FortiWeb 7.6 variations 7.6.0 by means of 7.6.3 are susceptible and require upgrading to 7.6.4 or above. 

FortiWeb 7.4 variations 7.4.0 by means of 7.4.7 want upgrading to 7.4.8 or above. FortiWeb 7.2 variations 7.2.0 by means of 7.2.10 require upgrading to 7.2.11 or above, whereas FortiWeb 7.0 variations 7.0.0 by means of 7.0.10 want upgrading to 7.0.11 or above.

The influence of profitable exploitation consists of the power to execute unauthorized code or instructions on affected techniques. 

This might result in full system compromise, information exfiltration, service disruption, or lateral motion throughout the community infrastructure.

Organizations ought to instantly improve their FortiWeb installations to the patched variations specified for every affected department. 

As an interim workaround, directors can disable the HTTP/HTTPS administrative interface to scale back the assault floor till patching is accomplished.

The vulnerability was responsibly disclosed by Kentaro Kawane from GMO Cybersecurity by Ierae, highlighting the significance of coordinated vulnerability disclosure processes. 

Organizations ought to implement extra safety measures resembling community segmentation, entry controls, and steady monitoring to detect potential exploitation makes an attempt whereas patches are being deployed.

Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Attacker, Code, Execute, FortiWeb, Injection, Malicious, SQL, Vulnerability

Post navigation

Previous Post: Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking
Next Post: Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges

Related Posts

New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files Cyber Security News
Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups Cyber Security News
How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor
  • Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor
  • Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News