Loading HuntDB...

CVE-2025-52970

HIGH
Published 2025-08-12T18:59:25.817Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-52970. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.7
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

Available Exploits

No exploits available for this CVE.

Related News

Fortinet FortiWeb Security Restriction Bypass Vulnerability

A vulnerability has been identified in Fortinet FortiWeb. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: Proof of Concept exploit code Is publicly available for CVE-2025-52970. The …

Hkcert.org 2025-08-18 01:00

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

Affected Products (ENISA)

fortinet
fortiweb

ENISA Scoring

CVSS Score (3.1)

7.7
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C

EPSS Score

0.320
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 18, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-jc24-hjq6-4g6f

Advisory Details

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 12, 2025, Modified: August 14, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

6 posts
Reddit 3 days, 22 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (19/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-42057](https://nvd.nist.gov/vuln/detail/CVE-2024-42057)** - 📝 A command injection vulnerability in the IPSec VPN feature of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, …

2
2.0
View Original High Risk
Reddit 4 days, 22 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (18/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-8091](https://nvd.nist.gov/vuln/detail/CVE-2025-8091)** - 📝 The EventON Lite plugin for WordPress is vulnerable to Information Exposure in all versions less than, or equal to, 2.4.6 via the add_single_eventon and add_eventon shortcodes due to …

2
2.0
View Original High Risk
Reddit 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (15/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-50167](https://nvd.nist.gov/vuln/detail/CVE-2025-50167)** - 📝 Windows Hyper-V Elevation of Privilege Vulnerability - 📅 **Published:** 12/08/2025 - 📈 **CVSS:** 7 - 🧭 **Vector:** CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 2 - ⚠️ **Priority:** 2 - 📝 …

1
1.0
View Original High Risk
Reddit 1 week, 1 day ago
crstux
Exploit

🔥 Top 10 Trending CVEs (14/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-53773](https://nvd.nist.gov/vuln/detail/CVE-2025-53773)** - 📝 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability - 📅 **Published:** 12/08/2025 - 📈 **CVSS:** 7.8 - 🧭 **Vector:** CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 10 - ⚠️ **Priority:** …

1
1.0
View Original High Risk
Reddit 1 week, 2 days ago
digicat

FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970)

Reddit 1 week, 3 days ago
pwntheplanet

FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970)

18
1
20.0

References

Published: 2025-08-12T18:59:25.817Z
Last Modified: 2025-08-14T18:28:51.328Z
Copied to clipboard!