CVE-2025-59719

Fortinet · Fortinet FortiWeb

A critical vulnerability has been identified in multiple versions of Fortinet FortiWeb that allows an unauthenticated attacker to bypass the FortiCloud Single Sign-On (SSO) authentication.

Executive summary

A critical vulnerability has been identified in multiple versions of Fortinet FortiWeb that allows an unauthenticated attacker to bypass the FortiCloud Single Sign-On (SSO) authentication. Successful exploitation could grant an attacker unauthorized administrative access to the FortiWeb appliance, posing a significant risk to the security of protected web applications and sensitive data.

Vulnerability

The vulnerability is an improper verification of a cryptographic signature within the Security Assertion Markup Language (SAML) Single Sign-On (SSO) authentication process for FortiCloud. An unauthenticated, remote attacker can exploit this flaw by sending a specially crafted SAML response to the FortiWeb appliance. The system fails to correctly validate the digital signature of the SAML assertion, leading it to accept a fraudulent authentication claim, which allows the attacker to bypass the login mechanism and gain unauthorized access.

Business impact

This vulnerability is rated as critical with a CVSS score of 9.8, indicating a high potential for severe impact. A successful exploit would grant an unauthenticated attacker administrative access to the FortiWeb appliance. This could lead to the complete compromise of the organization's web application security posture, allowing the attacker to disable security policies, exfiltrate sensitive data passing through the WAF, and launch further attacks against backend web applications. The potential consequences include significant data breaches, application downtime, reputational damage, and regulatory penalties.

Remediation

Immediate Action: Organizations must immediately prioritize patching affected Fortinet FortiWeb appliances by updating to the latest version. Administrators should consult the official Fortinet security advisory for specific patched versions and detailed upgrade instructions. After patching, review access logs for any signs of compromise that may have occurred prior to remediation.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes reviewing FortiWeb access and authentication logs for anomalous SSO login attempts, particularly those involving malformed or unexpected SAML assertions. Monitor for any unauthorized or suspicious configuration changes to security policies, user accounts, or system settings. Network traffic analysis may reveal unusual communication patterns to and from the FortiWeb management interface.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the FortiWeb management interface to a limited set of trusted IP addresses using firewall rules. If possible, place the management interface on a segregated, internal network segment, inaccessible from the public internet.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This vulnerability represents a critical risk to the organization and requires immediate attention. Due to the CVSS score of 9.8, which signifies a trivial-to-exploit vulnerability that can lead to a complete system compromise by an unauthenticated attacker, we strongly recommend applying the vendor-supplied patches to all affected FortiWeb instances on an emergency basis. Although this CVE is not yet on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime target for future exploitation. Prioritize patching and monitoring to prevent a potential compromise of your web application security infrastructure.