Fortinet
Multiple Products
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb...
2025-11-15
Description
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
Remediation
FEDERAL DEADLINE: November 20, 2025 (6 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: November 20, 2025 (6 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Update A relative path traversal vulnerability in Fortinet FortiWeb Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
CISA KEV Details
Deadline: November 20, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Executive Summary:
A critical vulnerability has been identified in multiple versions of Fortinet FortiWeb that allows an unauthenticated attacker to bypass the FortiCloud Single Sign-On (SSO) authentication. Successful exploitation could grant an attacker unauthorized administrative access to the FortiWeb appliance, posing a significant risk to the security of protected web applications and sensitive data.
Vulnerability Details
CVE-ID: CVE-2025-59719
Affected Software: Fortinet FortiWeb
Affected Versions:
Vulnerability:
The vulnerability is an improper verification of a cryptographic signature within the Security Assertion Markup Language (SAML) Single Sign-On (SSO) authentication process for FortiCloud. An unauthenticated, remote attacker can exploit this flaw by sending a specially crafted SAML response to the FortiWeb appliance. The system fails to correctly validate the digital signature of the SAML assertion, leading it to accept a fraudulent authentication claim, which allows the attacker to bypass the login mechanism and gain unauthorized access.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.8, indicating a high potential for severe impact. A successful exploit would grant an unauthenticated attacker administrative access to the FortiWeb appliance. This could lead to the complete compromise of the organization's web application security posture, allowing the attacker to disable security policies, exfiltrate sensitive data passing through the WAF, and launch further attacks against backend web applications. The potential consequences include significant data breaches, application downtime, reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action:
Organizations must immediately prioritize patching affected Fortinet FortiWeb appliances by updating to the latest version. Administrators should consult the official Fortinet security advisory for specific patched versions and detailed upgrade instructions. After patching, review access logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring:
Security teams should actively monitor for signs of exploitation. This includes reviewing FortiWeb access and authentication logs for anomalous SSO login attempts, particularly those involving malformed or unexpected SAML assertions. Monitor for any unauthorized or suspicious configuration changes to security policies, user accounts, or system settings. Network traffic analysis may reveal unusual communication patterns to and from the FortiWeb management interface.
Compensating Controls:
If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the FortiWeb management interface to a limited set of trusted IP addresses using firewall rules. If possible, place the management interface on a segregated, internal network segment, inaccessible from the public internet.
Exploitation Status
Public Exploit Available: False
Analyst Notes:
As of the publication date, December 9, 2025, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, given the critical CVSS score of 9.8 and the low complexity of a potential attack, security researchers and threat actors are expected to develop exploits rapidly. Organizations should assume imminent exploitation and act accordingly.
Analyst Recommendation
This vulnerability represents a critical risk to the organization and requires immediate attention. Due to the CVSS score of 9.8, which signifies a trivial-to-exploit vulnerability that can lead to a complete system compromise by an unauthenticated attacker, we strongly recommend applying the vendor-supplied patches to all affected FortiWeb instances on an emergency basis. Although this CVE is not yet on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime target for future exploitation. Prioritize patching and monitoring to prevent a potential compromise of your web application security infrastructure.