Critical OS Command Injection Vulnerability in FortiSIEM (CVE-2025-25256) Exploited in the Wild
Summary
Hide ▲
Show ▼
Fortinet has disclosed a critical OS command injection vulnerability in FortiSIEM, identified as CVE-2025-25256. The flaw, with a CVSS score of 9.8, allows unauthenticated attackers to execute unauthorized code or commands via crafted CLI requests. Exploit code for this vulnerability has been observed in the wild. Affected versions include FortiSIEM 6.1 through 6.7.9 and 7.0.0 through 7.3.1. Fortinet advises upgrading to the latest versions and limiting access to the phMonitor port (7900) as a workaround. Additionally, a Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring authentication. The vulnerability was silently patched in FortiWeb version 8.0.2. The exploitation activity was first detected early last month, and Fortinet has not assigned a CVE identifier or published an advisory on its PSIRT feed. Rapid7 observed an alleged zero-day exploit targeting FortiWeb was published for sale on a popular black hat forum on November 6, 2025. The watchTowr team has released an artifact generator tool for the authentication bypass to help identify susceptible devices.
Timeline
-
14.11.2025 04:41 2 articles · 1d ago
FortiWeb Path Traversal Vulnerability Exploited to Create Admin Users
The vulnerability was silently patched in FortiWeb version 8.0.2. The exploitation activity was first detected early last month, and Fortinet has not assigned a CVE identifier or published an advisory on its PSIRT feed. Rapid7 observed an alleged zero-day exploit targeting FortiWeb was published for sale on a popular black hat forum on November 6, 2025. The watchTowr team has released an artifact generator tool for the authentication bypass to help identify susceptible devices.
Show sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
-
13.08.2025 14:37 2 articles · 3mo ago
Critical OS Command Injection Vulnerability in FortiSIEM Exploited in the Wild
Fortinet disclosed a critical OS command injection vulnerability (CVE-2025-25256) in FortiSIEM, with a CVSS score of 9.8. The flaw allows unauthenticated attackers to execute unauthorized code or commands via crafted CLI requests. Exploit code for this vulnerability has been observed in the wild. Affected versions include FortiSIEM 6.1 through 6.7.9 and 7.0.0 through 7.3.1. Fortinet advises upgrading to the latest versions and limiting access to the phMonitor port (7900) as a workaround.
Show sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
Information Snippets
-
The vulnerability, CVE-2025-25256, is an OS command injection flaw in FortiSIEM.
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
The flaw has a CVSS score of 9.8, indicating a critical severity.
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
Unauthenticated attackers can execute unauthorized code or commands via crafted CLI requests.
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
Exploit code for this vulnerability has been found in the wild.
First reported: 13.08.2025 14:372 sources, 2 articlesShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
-
Affected versions include FortiSIEM 6.1 through 6.7.9 and 7.0.0 through 7.3.1.
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
Fortinet recommends upgrading to the latest versions and limiting access to the phMonitor port (7900).
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
The vulnerability is rooted in the function 'phMonitorProcess::handleStorageArchiveRequest' due to inadequate sanitization of user inputs.
First reported: 13.08.2025 14:371 source, 1 articleShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
-
The flaw can be exploited by supplying a specially crafted XML payload to run arbitrary shell commands.
First reported: 13.08.2025 14:372 sources, 2 articlesShow sources
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code — thehackernews.com — 13.08.2025 14:37
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
-
A Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring authentication.
First reported: 14.11.2025 04:412 sources, 2 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
-
The issue is fixed in FortiWeb 8.0.2, and admins are urged to update as soon as possible and check for signs of unauthorized access.
First reported: 14.11.2025 04:412 sources, 2 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
-
The exploitation was first spotted by threat intelligence company Defused on October 6, which reported an 'Unknown Fortinet exploit' used against exposed devices to create admin accounts.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
-
Threat actors are sending HTTP POST requests to the endpoint '/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi' containing payloads that create local admin-level accounts on the targeted device.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
-
The exploitation observed by researchers includes multiple sets of created username and password combinations, with usernames including Testpoint, trader1, and trader. Passwords seen assigned to accounts include 3eMIXX43, AFT3$tH4ck, and AFT3$tH4ckmet0d4yaga!n.
First reported: 14.11.2025 04:413 sources, 4 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The attacks originated from a wide range of IP addresses, including 107.152.41.19, 144.31.1.63, addresses in the 185.192.70.0/24 range, and 64.95.13.8 (from original October report).
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Security researchers at watchTowr Labs have confirmed the exploit, posting a video on X that demonstrates a failed FortiWeb login attempt, the execution of the exploit, and the successful login as the newly created admin user.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
watchTowr also released a tool called 'FortiWeb Authentication Bypass Artifact Generator,' which attempts to exploit the flaw by creating an admin user with an 8-character random username derived from a UUID.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The tool was released to help defenders identify vulnerable devices.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
According to Rapid7, the flaw affects FortiWeb versions 8.0.1 and earlier. The flaw was fixed in version 8.0.2, which is believed to have been released at the end of October.
First reported: 14.11.2025 04:413 sources, 4 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Administrators should review their devices for unusual administrative accounts, check logs for requests to the fwbcgi path, and investigate any activity from the identified suspicious IP addresses.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Administrators should also ensure these management interfaces are not reachable from the internet and are restricted to trusted networks or VPN-only access.
First reported: 14.11.2025 04:412 sources, 3 articlesShow sources
- Fortinet FortiWeb flaw with public PoC exploited to create admin users — www.bleepingcomputer.com — 14.11.2025 04:41
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The watchTowr team has observed active, indiscriminate in-the-wild exploitation of the vulnerability.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The vulnerability was silently patched in FortiWeb version 8.0.2.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The threat actor behind the exploitation sends a payload to the "/api/v2.0/cmdb/system/admin%3F/../../../../../cgi-bin/fwbcgi" endpoint via an HTTP POST request to create an admin account.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Some of the admin usernames and passwords created by the payloads detected in the wild include Testpoint / AFodIUU3Sszp5, trader1 / 3eMIXX43, trader / 3eMIXX43, test1234point / AFT3$tH4ck, Testpoint / AFT3$tH4ck, and Testpoint / AFT3$tH4ckmet0d4yaga!n.
First reported: 14.11.2025 11:002 sources, 2 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The exploitation activity was first detected early last month.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Fortinet has not assigned a CVE identifier or published an advisory on its PSIRT feed.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
Rapid7 observed an alleged zero-day exploit targeting FortiWeb was published for sale on a popular black hat forum on November 6, 2025.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
-
The watchTowr team has released an artifact generator tool for the authentication bypass to help identify susceptible devices.
First reported: 14.11.2025 11:003 sources, 3 articlesShow sources
- Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch — thehackernews.com — 14.11.2025 11:00
- Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks — www.bleepingcomputer.com — 14.11.2025 19:00
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability — www.securityweek.com — 14.11.2025 22:17
Similar Happenings
Critical Remote Command Execution Vulnerability Exploited in CentOS Web Panel
A critical remote command execution vulnerability (CVE-2025-48703) in CentOS Web Panel (CWP) is being actively exploited. The flaw allows unauthenticated attackers to execute arbitrary shell commands as a valid user. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, urging federal entities to patch or discontinue use by November 25. The issue affects all CWP versions before 0.9.8.1204. The vulnerability was demonstrated in late June and reported to CWP on May 13. The fix was released on June 18 in version 0.9.8.1205. CISA did not provide details on the exploitation methods, targets, or origin of the malicious activity.
Post SMTP Plugin Vulnerability Exploited to Hijack WordPress Admin Accounts
A critical vulnerability in the Post SMTP WordPress plugin, tracked as CVE-2025-11833, is being actively exploited to hijack administrator accounts. The flaw allows unauthenticated attackers to read logged emails, including password reset messages, leading to account takeover and full site compromise. The vulnerability affects all versions of Post SMTP from 3.6.0 and older, with over 400,000 downloads. The issue was reported on October 11 and patched on October 29. However, as of November 4, at least 210,000 sites remain vulnerable. Exploitation attempts began on November 1, with over 4,500 blocked attempts since then. The Post SMTP plugin is a popular email delivery solution for WordPress. The flaw allows unauthenticated attackers to read arbitrary logged emails, including password reset messages. The vulnerability was reported on October 11 and patched on October 29. However, as of November 4, at least 210,000 sites remain vulnerable. Exploitation attempts began on November 1, with over 4,500 blocked attempts since then.
Active Exploitation of Critical Microsoft WSUS Flaw
A critical vulnerability in Microsoft Windows Server Update Service (WSUS), CVE-2025-59287, is being actively exploited in the wild. This flaw, with a CVSS score of 9.8, allows attackers to drop malicious payloads and execute arbitrary commands on infected hosts. The vulnerability affects WSUS versions 3.32.x and was discovered by Eye Security and Huntress. The Cybersecurity and Infrastructure Security Agency (CISA) has ordered U.S. government agencies to patch the flaw, which was added to the Known Exploited Vulnerabilities catalog. Organizations using WSUS are advised to apply the out-of-band security updates provided by Microsoft to mitigate the risk of exploitation. The flaw was originally patched by Microsoft as part of its Patch Tuesday updates, but attackers have since weaponized it to deploy .NET executables and Base64-encoded PowerShell scripts. Shadowserver is tracking over 2,800 WSUS instances with default ports exposed online. The vulnerability is a deserialization of untrusted data flaw that allows unauthenticated attackers to achieve remote code execution with system privileges by sending malicious encrypted cookies to the GetCookie() endpoint. A compromised WSUS server could potentially be used to distribute malicious updates to the entire network of client computers, making it particularly dangerous for large enterprises. Huntress advised isolating network access to WSUS and blocking inbound traffic to TCP ports 8530 and 8531 as remediation steps. The out-of-band (OOB) security update KB5070881 for CVE-2025-59287 broke hotpatching on some Windows Server 2025 devices. Microsoft has released a new update, KB5070893, to address the issue without disrupting hotpatching. Administrators are advised to install this update to maintain hotpatching functionality.
Critical WSUS RCE Vulnerability Exploited in the Wild
A critical remote code execution (RCE) vulnerability (CVE-2025-59287) in Windows Server Update Service (WSUS) is being actively exploited in the wild. The flaw allows attackers to run malicious code with SYSTEM privileges on Windows servers with the WSUS Server role enabled. Microsoft has released out-of-band patches for all affected Windows Server versions. Cybersecurity firms have observed exploitation attempts and the presence of publicly available proof-of-concept exploit code. The vulnerability is considered potentially wormable between WSUS servers and poses a significant risk to organizations. The flaw concerns a case of deserialization of untrusted data in WSUS. The vulnerability was discovered and reported by security researchers MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange with CODE WHITE GmbH. CISA and NSA, along with international partners, have issued guidance to secure Microsoft Exchange Server instances, including recommendations to restrict administrative access, implement multi-factor authentication, and enforce strict transport security configurations. The agencies advise decommissioning end-of-life on-premises or hybrid Exchange servers after transitioning to Microsoft 365. Sophos reported threat actors exploiting the vulnerability to harvest sensitive data from U.S. organizations across various industries, with at least 50 victims identified. The exploitation activity was first detected on October 24, 2025, a day after Microsoft issued the update. Attackers use Base64-encoded PowerShell commands to exfiltrate data to a webhook[.]site endpoint. Michael Haag of Splunk noted an alternate attack chain involving the Microsoft Management Console binary (mmc.exe) to trigger cmd.exe execution.
Critical Command Injection Vulnerabilities in TP-Link Omada Gateways
TP-Link Omada and Festa VPN routers are affected by six critical command injection vulnerabilities, including newly discovered CVE-2025-7850 and CVE-2025-7851. These flaws allow for arbitrary OS command execution and root access, potentially leading to full compromise, data theft, lateral movement, and persistence. The vulnerabilities affect multiple Omada gateway models and firmware versions. Firmware updates have been released to address these issues. TP-Link Omada gateways are full-stack solutions for small to medium businesses, including router, firewall, and VPN gateway functionalities. The flaws, CVE-2025-6542 and CVE-2025-6541, can be exploited remotely without authentication or via the web management interface. Two additional severe flaws, CVE-2025-8750 and CVE-2025-7851, can allow authenticated command injection and root access under certain conditions. The newly discovered vulnerabilities, CVE-2025-7850 and CVE-2025-7851, are due to an incomplete fix of a previous vulnerability, CVE-2024-21827, leaving residual debug code and insecure private key usage.