Fortinet FortiManager SQLi (FG-IR-24-437)

low Nessus Plugin ID 241982

Synopsis

Remote host is affected by a sqli vulnerability.

Description

The version of FortiManager installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-24-437 advisory.

- An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager and FortiAnalyzer may allow an authenticated attacker with high privilege to extract database information via crafted requests. (CVE-2025-24474)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

For 6.4.x / 7.0.x / 7.2.x, see vendor advisory. For 7.4.x, upgrade to FortiManager version 7.4.7 or later. For 7.6.x, upgrade to FortiManager version 7.6.2 or later.

See Also

https://www.fortiguard.com/psirt/FG-IR-24-437

Plugin Details

Severity: Low

ID: 241982

File Name: fortimanager_FG-IR-24-437.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 7/11/2025

Updated: 7/11/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.9

CVSS v2

Risk Factor: Low

Base Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:M/C:P/I:N/A:N

CVSS Score Source: CVE-2025-24474

CVSS v3

Risk Factor: Low

Base Score: 2.7

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

Required KB Items: Host/Fortigate/model, Host/Fortigate/version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/8/2025

Vulnerability Publication Date: 7/8/2025

Reference Information

CVE: CVE-2025-24474

IAVA: 2025-A-0481