CVE-2025-48418
Published: 10 March 2026
Summary
CVE-2025-48418 is a medium-severity Hidden Functionality (CWE-912) vulnerability in Fortinet Fortimanager. Its CVSS base score is 6.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Documenting every system component at the required granularity and reviewing the inventory detects or prevents hidden functionality from remaining undetected.
Recovery eliminates hidden functionality or backdoors introduced during compromise.
Policy requires supplier transparency and testing to detect hidden functionality or backdoors inserted in the supply chain.
Screening high-risk technical positions lowers the probability that hidden functionality or backdoors will be added by authorized personnel.
Hunting identifies hidden functionality used for persistence or evasion after initial compromise.
TSCM surveys discover and eliminate hidden surveillance functionality that would otherwise remain undetected in the environment.
Change control, approval gates, and flaw tracking force hidden functionality to be either documented or discovered and removed.
Vetting and integrity controls during acquisition reduce the likelihood of hidden backdoors or malicious functionality introduced by suppliers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hidden CLI command enables authenticated read-only admin to escalate privileges via direct exploitation of the backdoor functionality.
NVD Description
A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.0 through 7.2.10, FortiAnalyzer 7.0.0 through 7.0.14, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud 7.2.1 through 7.2.10, FortiAnalyzer…
more
Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.0 through 7.2.10, FortiManager 7.0.0 through 7.0.14, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3, FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1 through 7.0.14, FortiManager Cloud 6.4 all versions may allow a remote authenticated read-only admin with CLI access to escalate their privilege via use of a hidden command.
Deeper analysisAI
CVE-2025-48418 is a hidden functionality vulnerability (CWE-912) affecting multiple versions of Fortinet FortiAnalyzer and FortiManager products, including both on-premises and Cloud deployments. Specifically, it impacts FortiAnalyzer 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10, 7.0.0 through 7.0.14, and 6.4 all versions; FortiAnalyzer Cloud 7.6.2, 7.4.1 through 7.4.7, 7.2.1 through 7.2.10, 7.0.1 through 7.0.14, and 6.4 all versions; FortiManager 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10, 7.0.0 through 7.0.14, and 6.4 all versions; and FortiManager Cloud 7.6.2 through 7.6.3, 7.4.1 through 7.4.7, 7.2.1 through 7.2.10, 7.0.1 through 7.0.14, and 6.4 all versions. The vulnerability has a CVSS v3.1 base score of 6.7 (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
A remote authenticated read-only administrator with CLI access can exploit this vulnerability by using a hidden command to escalate privileges. The attack requires local access vectors as per the CVSS assessment, low complexity, high privileges for initial access, and no user interaction, potentially leading to high confidentiality, integrity, and availability impacts.
Fortinet's PSIRT advisory (FG-IR-26-081) provides details on mitigation and patching; security practitioners should consult this reference for specific remediation steps.
Details
- CWE(s)