Fortinet has issued an urgent advisory warning customers that a newly disclosed vulnerability in FortiWeb, tracked as CVE-2025-58034, is being actively exploited in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add the flaw to its Known Exploited Vulnerabilities (KEV) Catalog.
According to Fortinet’s advisory: “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.”
The company confirms the severity of the situation, stating: “Fortinet has observed this to be exploited in the wild.”
While exploitation requires authentication, many real-world deployments rely on shared admin credentials, weak passwords, or integration with external access portals—a combination that dramatically increases attacker success.
The flaw enables attackers to craft malicious HTTP requests or CLI inputs that the device fails to properly sanitize, leading to direct execution of arbitrary commands on the underlying operating system.
In high-security environments where FortiWeb operates as a critical application firewall or reverse proxy, such a compromise could lead to:
- Complete administrative takeover
- Implantation of persistent backdoors
- Web traffic manipulation
- Lateral movement deeper into protected networks
- Exfiltration of sensitive application data
The advisory lists impacted versions and required upgrade paths:
| Product Version | Affected Builds | Required Upgrade |
|---|---|---|
| FortiWeb 8.0 | 8.0.0 – 8.0.1 | Upgrade to 8.0.2 or above |
| FortiWeb 7.6 | 7.6.0 – 7.6.5 | Upgrade to 7.6.6 or above |
| FortiWeb 7.4 | 7.4.0 – 7.4.10 | Upgrade to 7.4.11 or above |
| FortiWeb 7.2 | 7.2.0 – 7.2.11 | Upgrade to 7.2.12 or above |
| FortiWeb 7.0 | 7.0.0 – 7.0.11 | Upgrade to 7.0.12 or above |
With Fortinet and CISA both confirming exploitation, administrators are urged to treat CVE-2025-58034 as an active threat, not a theoretical one. All organizations—especially those in government, finance, healthcare, and telecommunications—should prioritize upgrades and review authentication policies around FortiWeb management access.
Related Posts:
- ZERO-DAY ATTACK WARNING: Fortinet FortiWeb Exploit Grants Unauthenticated Admin Access!
- FortiWeb SQL Injection (CVE-2025-25257) Added to CISA KEV After Active Exploitation, PoC Available!
- CVE-2025-25257 (CVSS 9.6): Pre-Auth SQLi in Fortinet FortiWeb Opens Door to RCE, PoC Published
- Fortinet patches critical CVE-2022-39952 & CVE-2021-42756 bugs in its products