CVE Alert: CVE-2025-25257 – Fortinet – FortiWeb

CVE-2025-25257

CRITICALCISA KEVExploitation active

An improper neutralization of special elements used in an SQL command (‘SQL Injection’) vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.

CVSS v3.1 (9.6)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Fortinet
Product
FortiWeb
Versions
7.6.0 lte 7.6.3 | 7.4.0 lte 7.4.7 | 7.2.0 lte 7.2.10 | 7.0.0 lte 7.0.10
CWE
CWE-89, Execute unauthorized code or commands
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C
Published
2025-07-17T15:10:04.532Z
Updated
2025-07-30T01:36:09.012Z

AI Summary Analysis

Risk verdict

Critical risk: unauthenticated SQL injection on the affected web application firewall with active exploitation and a CISA KEV listing; treat as priority 1.

Why this matters

Successful exploitation could read or alter sensitive data, bypass authentication, or command back-end systems, with rapid automation possible due to no user interaction. The impact is high for organisations storing customer data or relying on this device for public-facing security controls.

Most likely attack path

Remote, network-based exploitation via crafted HTTP/HTTPS requests; no credentials or user interaction required. The attacker can inject SQL through vulnerable input surfaces, enabling data access or modification while the scope remains unchanged, allowing potential lateral movement into connected systems.

Who is most exposed

Organisations hosting internet-facing deployments of this appliance (perimeter/DMZ or front-end web assets) are most at risk, particularly where public apps rely on this product as a gatekeeper.

Detection ideas

  • WAF logs showing repeated SQLi-pattern payloads (e.g., UNION SELECT, sleep(), tautologies) on login or data endpoints.
  • Sudden spikes in 4xx/5xx responses or DB-related errors tied to specific URLs.
  • Unusual, high-latency database queries or failed query patterns in application logs.
  • Correlation with known exploitation indicators from KEV/advisories.

Mitigation and prioritisation

  • Apply vendor-recommended patches to the latest available releases (do not rely on old builds).
  • Enable strict SQLi detection rules and tighten input validation at the gateway.
  • Restrict access to management surfaces; implement network segmentation and rate limiting; disable verbose error messages.
  • Plan a change window for deployment and validate in a staging environment.
  • Treat as priority 1 due to KEV presence and active exploitation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.