FortiWeb - Authentication Bypass (CVE-2025-52970)
571Exploiting IPs reported
A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.
CrowdSec analysis
CVE-2025-52970 is a vulnerability in Fortinet FortiWeb that stems from improper parameter handling, potentially allowing unauthenticated remote attackers with certain non-public information to escalate privileges and gain administrative access. Exploiting this flaw could enable attackers to take full control of affected FortiWeb devices, leading to significant risks such as data compromise, configuration tampering, or service disruption.
CrowdSec has been tracking this vulnerability and its exploits since 3rd of September 2025.
CrowdSec network data shows that most actors exploiting CVE-2025-52970 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. In addition, according to the CrowdSec network, attack volume against CVE-2025-52970 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.
Attackers exploit the /api/fabric/device/status
endpoint by injecting SQL commands via the Authorization
header, which can lead to authentication bypass and remote code execution. Subsequent exploitation stages may involve writing a webshell to /cgi-bin/x.cgi
and triggering it with crafted requests.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.