CVE-2025-25256
ENISA EUVD: EUVD-2025-24462 ↗
✓ Confirmed 0-Day
Triaged: March 5, 2026
5 articles
Published: 2025-08-12
EPSS Score
Source: FIRST.org · 2026-05-23
39.56%
probability
This CVE has a 39.56% probability
of being exploited in the next 30 days.
0%
Top 97.4th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)9.8
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
High
Remediation Level
Not Defined
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C
Description
VulnerabilityLookup (CNA)An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
Affected Products
Fortinet
FortiSIEM
7.3.0
7.2.0
7.1.0
7.0.0
6.7.0
6.6.0
Attack Intelligence
Exploits & PoC
18
2025-08-15
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
85%
EPSS
39.56%
CVSS v3.1
9.8
Mentions
5
Last Seen
Apr 06, 2026
CNA Information
CNA Assigner
fortinet
Analyst Note
BleepingComputer article explicitly names this as a 'FortiWeb zero-day exploited in attacks,' indicating active exploitation in the wild. CISA urgency directive (7-day patch deadline) corroborates active exploitation requiring immediate remediation. Timing aligns with recent 2025 CVE publication and exploitation reports.
Threat Actors 8
Hacking Team
apt_group
🇮🇹 IT
Volt Typhoon
apt_group
Information theft and espionage
🇨🇳 CN
RomCom
apt_group
Financial gain
🇷🇺 RU
Greedy Sponge
apt_group
🇲🇽 MX
Rocke
apt_group
🇨🇳 CN
Void Rabisu
apt_group
Financial gain
🇷🇺 RU
Red October
apt_group
🇷🇺 RU
Mana Team
apt_group
🇨🇳 CN
Triage Info
Decided atMar 05, 2026
Published DateAug 12, 2025