CrowdSec
5/10CrowdSec Score

FortiWeb - Authentication Bypass (CVE-2025-52970)

Published on12-08-2025
First seen on04-09-2025

813Exploiting IPs reported

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

CrowdSec analysis

CVE-2025-52970 is a vulnerability in Fortinet FortiWeb that stems from improper parameter handling, potentially allowing unauthenticated remote attackers with certain non-public information to escalate privileges and gain administrative access. Exploiting this flaw could enable attackers to take full control of affected FortiWeb devices, leading to significant risks such as data compromise, configuration tampering, or service disruption.

CrowdSec has been tracking this vulnerability and its exploits since 3rd of September 2025.

CrowdSec network data shows that most actors exploiting CVE-2025-52970 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-52970 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit the /api/fabric/device/status endpoint by injecting SQL commands via the Authorization header, which can lead to authentication bypass and remote code execution. Subsequent exploitation stages may involve writing a webshell to /cgi-bin/x.cgi and triggering it with crafted requests.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.