Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

Apple introduces cheaper option for App Store subscriptions

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)
Identity

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

By July 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 11, 2025Ravi LakshmananUS

FortiWeb's SQL injection defect

Fortinet has released fixes for critical security flaws affecting FortiWeb. This allows an unauthorized attacker to execute arbitrary database commands on the sensitive instance.

Tracked as CVE-2025-25257, the vulnerability has a CVSS score of 9.6 out of 10.0.

Inappropriate neutralization of special elements used in SQL command (“SQL Injection”) vulnerabilities [CWE-89] FortiWeb could allow unauthorized attackers to execute malformed SQL code or commands via HTTP or HTTPS requests created,” Fortinet said in an advisory released this week.

Cybersecurity

The drawbacks affect the next version –

Fortiweb 7.6.0 to 7.6.3 (7.6.4 or later) FortiWeb 7.4.0 (upgraded to 7.4.8 or later) From 7.2.0 to 7.2.10 (upgraded to 7.2.11 or higher) FortiWeb 7.0.0 to 7.0.10 (upgraded to 7.0.11 or above)

Kentaro Kawane of GMO Cybersecurity was recently admitted to report a set of significant defects in Cisco ID Services and ISE Passive Identity Connectors (CVE-2025-20286, CVE-2025-20281, and CVE-2025-20282).

In an analysis published today, Watchtowr Labs said the issue is rooted in a function called “get_fabric_user_by_token” that is associated with the fabric connector component that acts as a bridge between Fortiweb and other Fortinet products.

This function is called from another function named “Fabric_access_Check”. This is called from three different API endpoints:[0-9]/fabric/widget/[a-z]+, “and”/api/v[0-9]/Fabric/Widget. ”

The problem is that attacker control input passed through the Bearer Token Authorization header in a specially created HTTP request is passed directly to the SQL database query without proper sanitization and ensures that it does not contain malicious, not harmful code.

Attacks can be further expanded by embedding them in a select … outfile statement. By taking advantage of the fact that the query is executed as the “mysql” user, the results of command execution can be written to the underlying operating system file.

Cybersecurity

“The newer version of this function replaces the previous format string query with a prepared statement. This is a reasonable attempt to prevent STAL injection,” said security researcher Sina Kheirkhah.

As a temporary workaround until you have applied the required patches, users are advised to disable the HTTP/HTTPS management interface.

Because flaws in Fortinet devices have been exploited by threat actors in the past, it is essential that users move quickly to update to the latest version to mitigate potential risk.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleYC Back Apolink by 19-year-old Bag $4.3 million to build a 24/7 connection for Leo satellite
Next Article Hazardous conditions that can cause seizures, coma, and death can rise dramatically as the climate warms

Related Posts

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

April 28, 2026

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

April 28, 2026

Why secure data movement is the Zero Trust bottleneck that no one talks about

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

Apple introduces cheaper option for App Store subscriptions

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

Snapchat introduces AI-powered conversational ads to its app

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.