Cyber Posture

CVE-2025-64446

CriticalCISA KEVActive ExploitationPublic PoC

Published: 14 November 2025

Published
14 November 2025
Modified
21 November 2025
KEV Added
14 November 2025
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.9291 99.8th percentile
Risk Priority 95 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-64446 is a critical-severity Relative Path Traversal (CWE-23) vulnerability in Fortinet Fortiweb. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.2% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-5 (Security Alerts, Advisories, and Directives).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and correction of system flaws such as this relative path traversal vulnerability through timely application of Fortinet patches.

prevent

Mandates receiving and implementing security alerts and advisories from Fortinet PSIRT and CISA KEV cataloging this actively exploited vulnerability.

prevent

Implements input validation on HTTP/HTTPS requests to block or sanitize relative path traversal sequences targeting the vulnerable FortiWeb handler.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
T1136.001 Local Account Persistence
Adversaries may create a local account to maintain access to victim systems.
Why these techniques?

Relative path traversal enables unauthenticated execution of administrative commands on FortiWeb (network appliance), facilitating public-facing application exploitation for initial access (T1190), network device CLI command execution (T1059.008), and local account creation as demonstrated in the PoC (T1136.001).

NVD Description

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted…

more

HTTP or HTTPS requests.

Deeper analysisAI

CVE-2025-64446 is a relative path traversal vulnerability (CWE-23) affecting Fortinet FortiWeb web application firewalls in multiple versions, specifically 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11. It enables attackers to execute administrative commands on the system by sending crafted HTTP or HTTPS requests. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting its network accessibility (AV:N), low attack complexity (AC:L), lack of required privileges or user interaction (PR:N/UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability remotely over the network with minimal complexity, requiring no privileges or user interaction. Successful exploitation grants the ability to execute arbitrary administrative commands, potentially leading to full system compromise, including data exfiltration, modification, or disruption of the FortiWeb appliance.

Fortinet's PSIRT advisory (FG-IR-25-910) provides details on the issue and likely mitigation steps, such as applying patches for affected versions. Additional technical analysis appears in a GitHub repository from WatchTowr Labs focused on FortiWeb authentication bypass techniques.

This vulnerability is cataloged in CISA's Known Exploited Vulnerabilities list, indicating active real-world exploitation. Security practitioners should prioritize patching affected FortiWeb instances.

Details

CWE(s)
KEV Date Added
14 November 2025

Affected Products

fortinet
fortiweb
7.0.0 — 7.0.12 · 7.2.0 — 7.2.12 · 7.4.0 — 7.4.10

CVEs Like This One

CVE-2025-58034Same product: Fortinet Fortiwebboth on KEV
CVE-2025-25257Same product: Fortinet Fortiwebboth on KEV
CVE-2025-59719Same product: Fortinet Fortiweb
CVE-2025-52970Same product: Fortinet Fortiweb
CVE-2025-64447Same product: Fortinet Fortiweb
CVE-2025-66178Same product: Fortinet Fortiweb
CVE-2025-24472Same vendor: Fortinetboth on KEV
CVE-2025-59718Same vendor: Fortinetboth on KEV
CVE-2025-52436Same vendor: Fortinet
CVE-2025-53847Same vendor: Fortinet

References