Loading HuntDB...

CVE-2025-52970

HIGH
Published 2025-08-12T18:59:25.817Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-52970. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.7
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

Available Exploits

No exploits available for this CVE.

Related News

Fortinet FortiWeb Security Restriction Bypass Vulnerability

A vulnerability has been identified in Fortinet FortiWeb. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: Proof of Concept exploit code Is publicly available for CVE-2025-52970. The …

Hkcert.org 2025-08-18 01:00

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Malicious code in bioql (PyPI)

Affected Products (ENISA)

fortinet
fortiweb

ENISA Scoring

CVSS Score (3.1)

7.7
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C

EPSS Score

0.480
probability

Data provided by ENISA EU Vulnerability Database. Last updated: October 3, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-jc24-hjq6-4g6f

Advisory Details

A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 12, 2025, Modified: August 14, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

13 posts
Reddit 3 days, 6 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (05/10/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-9864](https://nvd.nist.gov/vuln/detail/CVE-2025-9864)** - 📝 Use after free in V8 in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: …

1
1.0
View Original High Risk
Reddit 6 days, 5 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (02/10/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-3400](https://nvd.nist.gov/vuln/detail/CVE-2024-3400)** - 📝 A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature …

2
2.0
View Original High Risk
Reddit 2 weeks, 2 days ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (22/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-57822](https://nvd.nist.gov/vuln/detail/CVE-2025-57822)** - 📝 Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could …

1
1.0
View Original High Risk
Reddit 4 weeks ago
MauriceTorres
Exploit PoC

𝗧𝗼𝗱𝗮𝘆'𝘀 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 𝗼𝘃𝗲𝗿𝘃𝗶𝗲𝘄! ▪️ Microsoft has addressed 81 vulnerabilities, two zero-days with PoC (CVE-2025-55234 and CVE-2025-21907), 8 critical ▪️ Third-party: actively exploited vulnerabilities in Google Chrome, Android, Apple, WhatsApp, FreePBX, Citrix, and Fortinet, plus major third-party issues affecting Docker Desktop, Cisco Secure Firewall, Intel, Passwordstate, and popular password manager …

7
7.0
View Original High Risk
Reddit 1 month, 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (26/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-55746](https://nvd.nist.gov/vuln/detail/CVE-2025-55746)** - 📝 Directus is a real-time API and App dashboard for managing SQL database content. From 10.8.0 to before 11.9.3, a vulnerability exists in the file update mechanism which allows …

2
2.0
View Original High Risk
Reddit 1 month, 1 week ago
crstux
Exploit PoC

🔥 Top 10 Trending CVEs (25/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54253](https://nvd.nist.gov/vuln/detail/CVE-2025-54253)** - 📝 Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass …

1
1.0
View Original High Risk
Reddit 1 month, 2 weeks ago
waihtis
Exploit PoC Payload

Heads up if you admin FortiWeb (CVE-2025-52970) FortiWeb has recently released details of a vulnerability (CVE-2025-52970) - for which a technical exploit write-up exists but no public POC as of yet. Someone has now reversed the write-up and is actively attempting exploitation. I run a set of FortiWeb honeypots and …

100
7
114.0
View Original High Risk
Reddit 1 month, 2 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (19/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-42057](https://nvd.nist.gov/vuln/detail/CVE-2024-42057)** - 📝 A command injection vulnerability in the IPSec VPN feature of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, …

2
2.0
View Original High Risk
Reddit 1 month, 2 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (18/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-8091](https://nvd.nist.gov/vuln/detail/CVE-2025-8091)** - 📝 The EventON Lite plugin for WordPress is vulnerable to Information Exposure in all versions less than, or equal to, 2.4.6 via the add_single_eventon and add_eventon shortcodes due to …

2
2.0
View Original High Risk
Reddit 1 month, 3 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (15/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-50167](https://nvd.nist.gov/vuln/detail/CVE-2025-50167)** - 📝 Windows Hyper-V Elevation of Privilege Vulnerability - 📅 **Published:** 12/08/2025 - 📈 **CVSS:** 7 - 🧭 **Vector:** CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 2 - ⚠️ **Priority:** 2 - 📝 …

1
1.0
View Original High Risk

References

Published: 2025-08-12T18:59:25.817Z
Last Modified: 2025-08-14T18:28:51.328Z
Copied to clipboard!