CVE-2025-54659
Published: 10 March 2026
Summary
CVE-2025-54659 is a medium-severity Path Traversal (CWE-22) vulnerability in Fortinet Fortisoar Agent Communication Bridge. Its CVSS base score is 5.8 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal on network-exposed agent port enables remote unauthenticated file read from local system (T1005) via crafted requests to a public-facing service (T1190).
NVD Description
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] vulnerability in Fortinet FortiSOAR Agent Communication Bridge 1.1.0, FortiSOAR Agent Communication Bridge 1.0 all versions may allow an unauthenticated attacker to read files accessible to the…
more
fortisoar user on a system where the agent is deployed, via sending a crafted request to the agent port.
Deeper analysisAI
CVE-2025-54659 is an Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability (CWE-22) in Fortinet FortiSOAR Agent Communication Bridge version 1.1.0 and all versions of 1.0. The flaw allows an unauthenticated attacker to read files accessible to the "fortisoar" user on systems where the agent is deployed by sending a crafted request to the agent port. Published on 2026-03-10, it carries a CVSS v3.1 base score of 5.8 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N), indicating moderate severity with network accessibility, low attack complexity, no privileges or user interaction required, and low confidentiality impact in a scoped scenario.
An unauthenticated attacker who can reach the agent's listening port over the network can exploit this vulnerability remotely. By crafting a malicious request that traverses path restrictions, the attacker gains read access to arbitrary files permitted to the fortisoar user account on the host system, potentially exposing sensitive configuration data, logs, or other information depending on the deployment environment and permissions.
Fortinet has issued security advisory FG-IR-26-084, available at https://fortiguard.fortinet.com/psirt/FG-IR-26-084, which provides details on the vulnerability, affected versions, and recommended mitigation actions for security practitioners.
Details
- CWE(s)