New FortiWeb Zero-Day Under Active Attack

Share:

CVE-2025-58034 is a command injection vulnerability in Fortinet’s FortiWeb Web Application Firewall. Disclosed on November 18, 2025, this vulnerability is actively being exploited in the wild. It allows authenticated attackers to remotely execute arbitrary commands on affected systems through specially crafted HTTP requests or CLI commands.

Severity: High

Vulnerability Details

  • CVE: CVE-2025-58034
  • CVSS Score: 7.2
  • CWE: CWE-78 (Improper Neutralization of Special Elements used in an OS Command – “OS Command Injection”)
  • Description: The vulnerability lies in the failure to properly sanitize input used in OS command execution. FortiWeb’s management interface (both API and CLI) allows authenticated users to send commands that, if maliciously crafted, can escape intended boundaries and execute unauthorized commands directly on the underlying system.
  • Affected & Fixed Versions:
VersionAffectedFixed In
FortiWeb 8.08.0.0 through 8.0.1Upgrade to 8.0.2 or above
FortiWeb 7.67.6.0 through 7.6.5Upgrade to 7.6.6 or above
FortiWeb 7.47.4.0 through 7.4.10Upgrade to 7.4.11 or above
FortiWeb 7.27.2.0 through 7.2.11Upgrade to 7.2.12 or above
FortiWeb 7.07.0.0 through 7.0.11Upgrade to 7.0.12 or above

Exploitation

  • Preconditions:
    • Attacker must be authenticated (valid credentials required).
    • No user interaction required (low-complexity attack vector).
  • Attack Vector: Remote, via crafted HTTP requests or CLI commands.
  • Trend Micro has identified ~2000 attacks exploiting this vulnerability.
  • Likely targets: Internet-facing FortiWeb instances with weak credential controls.

Recommendations

  1. Immediately upgrade FortiWeb appliances to the fixed versions listed above.
  2. Ensure the FortiWeb management interface is not exposed to the public internet or untrusted networks.

Source:

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.