6.7

CVE-2025-22862

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2 all versions, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorFortinet
Product FortiProxy
Default Statusunaffected
Version <= 7.6.2
Version 7.6.0
Status affected
Version <= 7.4.8
Version 7.4.0
Status affected
Version <= 7.2.15
Version 7.2.0
Status affected
Version <= 7.0.21
Version 7.0.5
Status affected
VendorFortinet
Product FortiOS
Default Statusunaffected
Version <= 7.4.7
Version 7.4.0
Status affected
Version <= 7.2.11
Version 7.2.0
Status affected
Version <= 7.0.17
Version 7.0.6
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.03
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@fortinet.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.