Cyber Posture

CVE-2025-24470

High

Published: 11 February 2025

Published
11 February 2025
Modified
22 July 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0067 71.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24470 is a high-severity Improper Resolution of Path Equivalence (CWE-41) vulnerability in Fortinet Fortiportal. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 28.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-24470 by requiring timely remediation of the specific path equivalence flaw through patching as advised in the vendor bulletin.

prevent

Requires validation and sanitization of HTTP request paths to prevent improper resolution of path equivalences leading to source code disclosure.

preventdetect

Implements boundary protections such as web application firewalls to monitor and block crafted HTTP requests exploiting path traversal on publicly accessible FortiPortal instances.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability in the public-facing FortiPortal web application directly enables remote unauthenticated exploitation for initial access (T1190) and retrieval of source code as data from the local system (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An Improper Resolution of Path Equivalence vulnerability [CWE-41] in FortiPortal 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to retrieve source code via crafted HTTP requests.

Deeper analysisAI

CVE-2025-24470 is an Improper Resolution of Path Equivalence vulnerability (CWE-41) in FortiPortal versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, and 7.0.0 through 7.0.11. This issue enables a remote unauthenticated attacker to retrieve source code via crafted HTTP requests. The vulnerability carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting its high severity stemming from network-based access, low attack complexity, no required privileges or user interaction, changed scope, and high confidentiality impact.

A remote unauthenticated attacker can exploit CVE-2025-24470 by sending specially crafted HTTP requests to an affected FortiPortal instance accessible over the network. Successful exploitation allows the attacker to retrieve source code, potentially disclosing sensitive application logic, configurations, or other proprietary information without impacting integrity or availability.

Mitigation details are provided in the Fortinet PSIRT advisory FG-IR-25-015, available at https://fortiguard.fortinet.com/psirt/FG-IR-25-015. Security practitioners should consult this reference for patch information and recommended remediation steps.

Details

CWE(s)

Affected Products

fortinet
fortiportal
7.0.0 — 7.0.12 · 7.2.0 — 7.2.7 · 7.4.0 — 7.4.3

CVEs Like This One

CVE-2025-54659Same vendor: Fortinet
CVE-2025-25257Same vendor: Fortinet
CVE-2026-22828Same vendor: Fortinet
CVE-2026-21643Same vendor: Fortinet
CVE-2023-47539Same vendor: Fortinet
CVE-2025-59922Same vendor: Fortinet
CVE-2025-49784Same vendor: Fortinet
CVE-2024-45324Same vendor: Fortinet
CVE-2025-54820Same vendor: Fortinet
CVE-2025-24472Same vendor: Fortinet

References