CVE-2025-66178
Published: 10 March 2026
Summary
CVE-2025-66178 is a high-severity OS Command Injection (CWE-78) vulnerability in Fortinet Fortiweb. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in a public-facing web appliance directly enables remote exploitation (T1190) and arbitrary Unix shell command execution (T1059.004).
NVD Description
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.11, FortiWeb 7.2.0 through 7.2.12, FortiWeb 7.0.0 through 7.0.12 may allow an…
more
authenticated attacked to execute arbitrary commands via a specialy crafted HTTP request.
Deeper analysisAI
CVE-2025-66178 is an improper neutralization of special elements used in an OS command, classified as an OS command injection vulnerability (CWE-78), affecting Fortinet FortiWeb versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.5, 7.4.0 through 7.4.11, 7.2.0 through 7.2.12, and 7.0.0 through 7.0.12. Published on 2026-03-10, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.
An authenticated attacker with high privileges (PR:H) can exploit this vulnerability over the network with low complexity by crafting a malicious HTTP request. Successful exploitation enables the execution of arbitrary OS commands on the affected FortiWeb appliance.
For mitigation guidance, including patches and workarounds, refer to the Fortinet PSIRT advisory FG-IR-26-088 at https://fortiguard.fortinet.com/psirt/FG-IR-26-088.
Details
- CWE(s)