Patch Now: Public Exploits for FortiWeb RCE Flaw (CVE-2025-25257)

▼ Summary
– CVE-2025-25257 is a critical SQL injection vulnerability in Fortinet’s FortiWeb firewall, expected to be exploited soon.
– The flaw exists in FortiWeb’s Fabric Connector, allowing unauthenticated attackers to execute remote code with root privileges via crafted HTTP/HTTPS requests.
– Fortinet has patched the vulnerability, crediting researcher Kentaro Kawane for reporting it.
– Researchers have published proof-of-concept exploits, detailing how attackers can achieve remote code execution by manipulating SQL statements and Python files.
– FortiWeb users should upgrade to patched versions or disable the HTTP/HTTPS administrative interface to mitigate the risk.
Security teams are racing against time as public exploits emerge for CVE-2025-25257, a critical remote code execution vulnerability affecting Fortinet’s FortiWeb web application firewall. The flaw, now actively documented by researchers, poses significant risks if left unpatched, allowing attackers to execute malicious code with elevated privileges through crafted web requests.
The vulnerability resides in FortiWeb’s Fabric Connector, the component responsible for communication between FortiWeb and other Fortinet security products like FortiGate firewalls. Attackers can exploit improper input sanitization to inject SQL commands via HTTP/S requests, ultimately gaining root-level access to affected systems. Fortinet addressed the issue in recent updates, acknowledging researcher Kentaro Kawane for discovering the flaw.
Two separate proof-of-concept exploits surfaced last week, dramatically lowering the barrier for attackers. Security firm watchTowr released a detection script alongside technical details, revealing that unauthenticated attackers could trigger SQL injection through the `/api/fabric/device/status` endpoint. Rapid7’s Stephen Fewer summarized the attack chain: Malicious SQL statements write a Python `.pth` file to a system directory, which then executes arbitrary code when triggered by an HTTP request.
A second researcher confirmed independently discovering the flaw in February 2025 but only published their exploit code recently. While no active exploitation has been reported yet, the availability of working exploits increases the likelihood of attacks in the wild.
Organizations using FortiWeb must act immediately by upgrading to patched versions, 7.6.4, 7.4.8, 7.2.11, or 7.0.11, or disabling the administrative HTTP/HTTPS interface if updates aren’t feasible. Delaying mitigation could expose networks to severe compromise, given the flaw’s ease of exploitation and high impact.
Stay informed on critical vulnerabilities by subscribing to real-time security alerts. Proactive patching remains the strongest defense against emerging threats.
(Source: HelpNet Security)





