Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Posted on July 16, 2025July 16, 2025 By CWS

Dozens of Fortinet FortiWeb situations have been compromised with webshells in a widespread hacking marketing campaign, in response to the menace monitoring group The Shadowserver Basis.

The assaults are linked to a crucial vulnerability, tracked as CVE-2025-25257, for which public proof-of-concept (PoC) exploits have been launched simply days in the past.

Key Takeaways1. A crucial flaw in Fortinet FortiWeb is being actively exploited by hackers.2. Attackers are utilizing public exploits to put in webshells and take management of gadgets.3. Dozens of programs are confirmed compromised; fast patching is important.

The Shadowserver Basis reported on Tuesday that it had recognized 77 compromised FortiWeb situations, a slight lower from 85 the day past. The group famous that lively exploitation of the vulnerability has been noticed since July 11, the identical day researchers made exploit code publicly out there.

We’re sharing Fortinet FortiWeb situations compromised with webshells probably by way of CVE-2025-25257. We see 77 circumstances on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation exercise noticed since Jul eleventh. Tree map overview (compromised): pic.twitter.com/uhxApqKDPY— The Shadowserver Basis (@Shadowserver) July 16, 2025

The vulnerability on the coronary heart of those assaults, CVE-2025-25257, is a crucial pre-authenticated SQL injection (SQLi) flaw within the FortiWeb graphical consumer interface.

With a CVSS severity rating of 9.6 out of 10, the flaw permits unauthenticated attackers to execute unauthorized code or instructions remotely by sending specifically crafted HTTP requests.

Fortinet, a significant cybersecurity and firewall vendor, makes use of the FortiWeb equipment as a Internet Software Firewall (WAF) to guard net functions and APIs for giant enterprises and authorities companies.

Fortinet disclosed the vulnerability on July 8, 2025, and launched patches to deal with it. The flaw, found by safety researcher Kentaro Kawane of GMO Cybersecurity, resides within the FortiWeb Cloth Connector, a part that integrates the WAF with different Fortinet safety merchandise.

Nevertheless, on July 11, cybersecurity agency WatchTowr and one of many flaw’s co-discoverers printed PoC exploits, dramatically escalating the danger for organizations working unpatched variations.

The exploits demonstrated how an attacker might leverage SQL injection to plant a webshell or open a reverse shell on a weak system, granting them persistent entry and management.

The present wave of assaults confirms cybersecurity specialists’ fears that menace actors would rapidly weaponize the general public exploits. In keeping with Shadowserver, a further 223 FortiWeb administration interfaces remained uncovered to the web as of July 15.

We see 223 FortiWeb administration interfaces nonetheless uncovered on 2025-07-15 (no dedication of patch standing, but when unpatched for CVE-2025-25257 these are additionally all probably compromised).Tree map overview (publicity): pic.twitter.com/az8dlBP3Vt— The Shadowserver Basis (@Shadowserver) July 16, 2025

Whereas their patch standing is unconfirmed, these programs are thought of extremely more likely to be compromised in the event that they haven’t been up to date. The US has the very best variety of compromised gadgets at 40, adopted by the Netherlands, Singapore, and the UK.

Fortinet has urged clients to instantly improve to safe variations, together with FortiWeb 7.6.4, 7.4.8, 7.2.11, or 7.0.11 and later.

For organizations unable to use the patches straight away, the corporate recommends disabling the HTTP/HTTPS administrative interface as a brief workaround to dam the assault vector.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Exploits, Fortinet, FortiWeb, Hacked, Instances, PoC, Public, Webshells

Post navigation

Previous Post: MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials
Next Post: Top 3 CISO Challenges And How To Solve Them 

Related Posts

CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity Cyber Security News
OCRFix Botnet Trojan Uses Blockchain for Stealth Operations OCRFix Botnet Trojan Uses Blockchain for Stealth Operations Cyber Security News
Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Cyber Security News
MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew Cyber Security News
SEO Campaign Disguises Apps to Spread AsyncRAT SEO Campaign Disguises Apps to Spread AsyncRAT Cyber Security News
Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark