Vulnerabilities

Given the recent discovery of a critical vulnerability (CVE-2025-64446) in the Fortiweb appliances (exploitable via the management interfaces) I thought I would have a look at what other vulnerabilities have been discovered/published and what Proof of Concept (PoC) exploits exist in 2025.

I’ve used Grok to create a table:

CVE IDDescriptionPublication DateExploit PoC Release Date
CVE-2025-64446Relative path traversal allowing unauthenticated admin command execution via crafted HTTP/HTTPS requests2025-11-142025-11-14
CVE-2025-25257SQL injection allowing unauthenticated execution of unauthorized SQL code/commands via crafted requests2025-07-082025-07-11
CVE-2025-52970Improper handling of parameters enabling unauthenticated authentication bypass with non-public info2025-08-12N/A
CVE-2025-25254Path traversal allowing authenticated admin filesystem access/modification2025-04-08N/A
CVE-2025-27759OS command injection allowing authenticated privileged code/command execution via crafted CLI2025-08-12N/A
CVE-2025-53609Relative path traversal allowing authenticated arbitrary file read2025-09-09N/A
CVE-2025-47857OS command injection allowing privileged arbitrary code/command execution via crafted CLI2025-08-12N/A
CVE-2025-32766Stack-based buffer overflow allowing privileged arbitrary code execution via crafted CLI2025-08-12N/A

CVE-2025-64446

This path traversal has been used to create an application administrator user to provide persistent access via the management web interface.

https://fortiguard.fortinet.com/psirt/FG-IR-25-910

This was published online on twitter from a honeypot network (Defused Cyber) on October 6th, however it was not appreciated this was a zero day until this week.

A full PoC was released by WatchTowr:

https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass

CVE-2025-25257

https://www.fortiguard.com/psirt/FG-IR-25-151

https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257

This was an SQL Injection (Unauthenticated) – this could be used potentially to create local users in the web application as a form of backdoor/persistent access. It could also have been used to drop a web shell etc.