Advisory

Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution

Take action: If you have Fortinet FortiWeb systems running versions 7.0 through 7.6.3, make sure it's web admin interface is isolated from the internet and accessible from trusted networks. Then plan a quick patch. This patch just became urgent since PoC is now public! If you can't patch for extended period (more than a few weeks), consider disabling the web admin interface since that blocks the attacks, but also blocks your normal admin work. Seems easier to patch.


Learn More

Fortinet has patched a critical flaw in its FortiWeb web application firewall that could allow unauthenticated attackers to execute unauthorized SQL commands and achieve remote code execution. 

The vulnerability is tracked as CVE-2025-25257 (CVSS score 9.6) - improper neutralization of special elements used in SQL commands within FortiWeb's Graphical User Interface (GUI) component.

Affected versions:

  • FortiWeb 7.6: versions 7.6.0 through 7.6.3
  • FortiWeb 7.4: versions 7.4.0 through 7.4.7 
    FortiWeb 7.2: versions 7.2.0 through 7.2.10
  • FortiWeb 7.0: versions 7.0.0 through 7.0.10

Patched versions

  • FortiWeb 7.6: versions 7.6.4 or above
  • FortiWeb 7.4: versions 7.4.8 or above
    FortiWeb 7.2: versions 7.2.11 or above
  • FortiWeb 7.0: versions 7.0.11 or above

For organizations unable to immediately upgrade to the fixed versions, a temporary mitigation is disabling the HTTP/HTTPS administrative interface, This mitigation may limit administrative capabilities and is not considered a permanent solution.

Update - as of the 11th of July 2025, WatchTowr and an independent security researcher known as "faulty *ptrrr" released technical write-ups and proof-of-concept exploits.

Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution