CVE-2025-58034
Fortinet FortiWeb Analyse et atténuation des vulnérabilités

Aperçu

An OS Command Injection vulnerability (CVE-2025-58034) was discovered in Fortinet FortiWeb, affecting versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.5, 7.4.0 through 7.4.10, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11. The vulnerability was disclosed on November 18, 2025, and has been confirmed to be exploited in the wild. This security flaw allows an authenticated attacker to execute unauthorized code on the underlying system through crafted HTTP requests or CLI commands (Fortinet Advisory, CISA Alert).

Détails techniques

The vulnerability is classified as an Improper Neutralization of Special Elements used in an OS Command (CWE-78) with a CVSS v3.1 score of 6.7 (Medium severity). The issue requires authentication for exploitation, indicating that attackers need some level of prior access to the system. The vulnerability specifically affects the API and CLI interfaces of FortiWeb, allowing command injection through specially crafted requests (Fortinet Advisory, Hacker News).

Impact

Successful exploitation of CVE-2025-58034 enables authenticated attackers to execute unauthorized code on the underlying system, potentially leading to system compromise. The vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to its active exploitation in the wild, highlighting its significant security risk (CISA Alert).

Atténuation et solutions de contournement

Fortinet has released patches for all affected versions and recommends upgrading to the following versions: FortiWeb 8.0.2 or above for 8.0.x, 7.6.6 or above for 7.6.x, 7.4.11 or above for 7.4.x, 7.2.12 or above for 7.2.x, and 7.0.12 or above for 7.0.x. CISA has set a remediation deadline of November 25, 2025, for federal agencies (Fortinet Advisory, CISA Alert).

Réactions de la communauté

The security community has shown significant concern about this vulnerability, particularly due to its active exploitation in the wild. The addition to CISA's KEV catalog has elevated its priority for remediation across organizations. Security researchers, including Jason McFadyen from Trend Research, have contributed to the discovery and analysis of this vulnerability (Hacker News).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Fortinet FortiWeb Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-64446CRITICAL9.8
  • Fortinet FortiWebFortinet FortiWeb
  • cpe:2.3:a:fortinet:fortiweb
OuiOuiNov 14, 2025
CVE-2025-58034HIGH7.2
  • Fortinet FortiWebFortinet FortiWeb
  • cpe:2.3:a:fortinet:fortiweb
OuiOuiNov 18, 2025
CVE-2025-59669MEDIUM5.5
  • Fortinet FortiWebFortinet FortiWeb
  • cpe:2.3:a:fortinet:fortiweb
NonOuiNov 18, 2025
CVE-2025-53609MEDIUM4.9
  • Fortinet FortiWebFortinet FortiWeb
  • cpe:2.3:a:fortinet:fortiweb
NonOuiSep 09, 2025
CVE-2024-47569MEDIUM4.3
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiOct 14, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités