A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
Published: 2025-11-14
CVE-2025-64446 FortiWeb Zero-Day Exploited in the wild
https://www.theregister.com/2025/11/19/fortinet_confirms_second_fortiweb_0day/
https://www.securityweek.com/fortinet-discloses-second-exploited-fortiweb-zero-day-in-a-week/
https://www.hipaajournal.com/fortinet-patches-actively-exploited-fortiweb-zero-day-flaw/
https://www.helpnetsecurity.com/2025/11/19/fortiweb-vulnerability-cve-2025-58034/
https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
https://therecord.media/fortinet-fortiweb-vulnerability-cisa-advisory
https://www.fortiguard.com/psirt/FG-IR-25-910
https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html
Published: 2025-11-14
Updated: 2025-11-21
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.669
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest