Cyber Posture

CVE-2025-54659

Medium

Published: 10 March 2026

Published
10 March 2026
Modified
09 April 2026
KEV Added
Patch
CVSS Score 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
EPSS Score 0.0016 35.9th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-54659 is a medium-severity Path Traversal (CWE-22) vulnerability in Fortinet Fortisoar Agent Communication Bridge. Its CVSS base score is 5.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal on network-exposed agent port enables remote unauthenticated file read from local system (T1005) via crafted requests to a public-facing service (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] vulnerability in Fortinet FortiSOAR Agent Communication Bridge 1.1.0, FortiSOAR Agent Communication Bridge 1.0 all versions may allow an unauthenticated attacker to read files accessible to the…

more

fortisoar user on a system where the agent is deployed, via sending a crafted request to the agent port.

Deeper analysisAI

CVE-2025-54659 is an Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability (CWE-22) in Fortinet FortiSOAR Agent Communication Bridge version 1.1.0 and all versions of 1.0. The flaw allows an unauthenticated attacker to read files accessible to the "fortisoar" user on systems where the agent is deployed by sending a crafted request to the agent port. Published on 2026-03-10, it carries a CVSS v3.1 base score of 5.8 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N), indicating moderate severity with network accessibility, low attack complexity, no privileges or user interaction required, and low confidentiality impact in a scoped scenario.

An unauthenticated attacker who can reach the agent's listening port over the network can exploit this vulnerability remotely. By crafting a malicious request that traverses path restrictions, the attacker gains read access to arbitrary files permitted to the fortisoar user account on the host system, potentially exposing sensitive configuration data, logs, or other information depending on the deployment environment and permissions.

Fortinet has issued security advisory FG-IR-26-084, available at https://fortiguard.fortinet.com/psirt/FG-IR-26-084, which provides details on the vulnerability, affected versions, and recommended mitigation actions for security practitioners.

Details

CWE(s)

Affected Products

fortinet
fortisoar agent communication bridge
1.0, 1.1

CVEs Like This One

CVE-2024-55597Same vendor: Fortinet
CVE-2024-48884Same vendor: Fortinet
CVE-2024-48885Same vendor: Fortinet
CVE-2024-36512Same vendor: Fortinet
CVE-2025-24470Same vendor: Fortinet
CVE-2024-33502Same vendor: Fortinet
CVE-2025-25257Same vendor: Fortinet
CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2025-8343Shared CWE-22

References