Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Cloudseed startups did not cause flooding in Texas

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

YC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)
Identity

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

userBy userJuly 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 11, 2025Ravi LakshmananUS

FortiWeb's SQL injection defect

Fortinet has released fixes for critical security flaws affecting FortiWeb. This allows an unauthorized attacker to execute arbitrary database commands on the sensitive instance.

Tracked as CVE-2025-25257, the vulnerability has a CVSS score of 9.6 out of 10.0.

Inappropriate neutralization of special elements used in SQL command (“SQL Injection”) vulnerabilities [CWE-89] FortiWeb could allow unauthorized attackers to execute malformed SQL code or commands via HTTP or HTTPS requests created,” Fortinet said in an advisory released this week.

Cybersecurity

The drawbacks affect the next version –

Fortiweb 7.6.0 to 7.6.3 (7.6.4 or later) FortiWeb 7.4.0 (upgraded to 7.4.8 or later) From 7.2.0 to 7.2.10 (upgraded to 7.2.11 or higher) FortiWeb 7.0.0 to 7.0.10 (upgraded to 7.0.11 or above)

Kentaro Kawane of GMO Cybersecurity was recently admitted to report a set of significant defects in Cisco ID Services and ISE Passive Identity Connectors (CVE-2025-20286, CVE-2025-20281, and CVE-2025-20282).

In an analysis published today, Watchtowr Labs said the issue is rooted in a function called “get_fabric_user_by_token” that is associated with the fabric connector component that acts as a bridge between Fortiweb and other Fortinet products.

This function is called from another function named “Fabric_access_Check”. This is called from three different API endpoints:[0-9]/fabric/widget/[a-z]+, “and”/api/v[0-9]/Fabric/Widget. ”

The problem is that attacker control input passed through the Bearer Token Authorization header in a specially created HTTP request is passed directly to the SQL database query without proper sanitization and ensures that it does not contain malicious, not harmful code.

Attacks can be further expanded by embedding them in a select … outfile statement. By taking advantage of the fact that the query is executed as the “mysql” user, the results of command execution can be written to the underlying operating system file.

Cybersecurity

“The newer version of this function replaces the previous format string query with a prepared statement. This is a reasonable attempt to prevent STAL injection,” said security researcher Sina Kheirkhah.

As a temporary workaround until you have applied the required patches, users are advised to disable the HTTP/HTTPS management interface.

Because flaws in Fortinet devices have been exploited by threat actors in the past, it is essential that users move quickly to update to the latest version to mitigate potential risk.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleYC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite
Next Article Cloudseed startups did not cause flooding in Texas
user
  • Website

Related Posts

perfektblue bluetooth vulnerability exposes millions of vehicles to remote code execution

July 11, 2025

Protecting data in the AI ​​era

July 11, 2025

Critical Wing FTP Server Vulnerability (CVE-2025-47812)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cloudseed startups did not cause flooding in Texas

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

YC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite

Helios wants to be an AI operating system for public policy experts

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.