Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild

New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild

Posted on November 19, 2025November 19, 2025 By CWS

Fortinet has launched an pressing safety advisory addressing a newly found zero-day vulnerability, CVE-2025-58034, in its FortiWeb internet utility firewall platform, after proof emerged of energetic exploitation within the wild.

The flaw, characterised as improper neutralization of particular parts utilized in OS instructions (CWE-78), allows authenticated attackers to execute unauthorized code or instructions on focused units by way of crafted HTTP requests or by the platform’s CLI interface.

Safety researchers, together with Jason McFadyen from Development Analysis at Development Micro, are credited with responsibly reporting the vulnerability, which Fortinet printed on November 18 alongside mitigation steps.​

The vulnerability impacts a number of variations, together with FortiWeb 8.0 (as much as 8.0.1), 7.6 (as much as 7.6.5), 7.4 (as much as 7.4.10), 7.2 (as much as 7.2.11), and seven.0 (as much as 7.0.11).

FortiWeb Main VersionAffected VersionsPatched Model / Solution8.08.0.0 – 8.0.1Upgrade to eight.0.2 or above ​7.67.6.0 – 7.6.5Upgrade to 7.6.6 or above ​7.47.4.0 – 7.4.10Upgrade to 7.4.11 or above ​7.27.2.0 – 7.2.11Upgrade to 7.2.12 or above ​7.07.0.0 – 7.0.11Upgrade to 7.0.12 or above 

If exploited, attackers may acquire the power to run arbitrary code with system-level privileges, considerably compromising gadget integrity, doubtlessly pivoting deeper into community environments, and modifying or disabling internet protections.

The vulnerability is classed as medium severity with a CVSSv3 rating of 6.7 based on Fortinet, although a number of exterior researchers have famous comparable path traversal flaws for FortiWeb this month carry essential scores as a result of unauthenticated entry vectors.​

Exploitation Noticed within the Wild

Studies from safety analysts and organizations reminiscent of Rapid7 and Defused have tracked in-the-wild exploitation since early October, together with public postings of proof-of-concept code on underground boards.

Assaults have already focused internet-facing FortiWeb panels, with profitable exploitation enabling attackers to automate persistence utilizing newly created administrator accounts.

Fortinet urges all affected customers to improve to the obtainable patches in 8.0.2, 7.6.6, 7.4.11, 7.2.12, and seven.0.12. Limit administration interface publicity and instantly audit current admin accounts for unauthorized additions as further mitigation.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Code, Execution, Exploited, FortiWeb, Vulnerability, Wild

Post navigation

Previous Post: Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Next Post: Microsoft Unveils Security Enhancements for Identity, Defense, Compliance

Related Posts

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online Cyber Security News
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord Cyber Security News
Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack Cyber Security News
North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark