9.8

CVE-2025-64446

Warnung
Exploit
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FortinetFortiweb Version >= 7.0.0 < 7.0.12
FortinetFortiweb Version >= 7.2.0 < 7.2.12
FortinetFortiweb Version >= 7.4.0 < 7.4.10
FortinetFortiweb Version >= 7.6.0 < 7.6.5
FortinetFortiweb Version >= 8.0.0 < 8.0.2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login

14.11.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Fortinet FortiWeb Path Traversal Vulnerability

Schwachstelle

Fortinet FortiWeb contains a relative path traversal vulnerability that may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 92.91% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@fortinet.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-23 Relative Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.