CrowdSec
4/10CrowdSec Score

FortiWeb - Authentication Bypass (CVE-2025-52970)

Published on12-08-2025
First seen on04-09-2025

571Exploiting IPs reported

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

CrowdSec analysis

CVE-2025-52970 is a vulnerability in Fortinet FortiWeb that stems from improper parameter handling, potentially allowing unauthenticated remote attackers with certain non-public information to escalate privileges and gain administrative access. Exploiting this flaw could enable attackers to take full control of affected FortiWeb devices, leading to significant risks such as data compromise, configuration tampering, or service disruption.

CrowdSec has been tracking this vulnerability and its exploits since 3rd of September 2025.

CrowdSec network data shows that most actors exploiting CVE-2025-52970 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. In addition, according to the CrowdSec network, attack volume against CVE-2025-52970 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit the /api/fabric/device/status endpoint by injecting SQL commands via the Authorization header, which can lead to authentication bypass and remote code execution. Subsequent exploitation stages may involve writing a webshell to /cgi-bin/x.cgi and triggering it with crafted requests.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.