Fortinet FortiWeb is vulnerable to OS command injection (CVE-2025-58034). High severity and actively exploited. Update to versions 7.0.12+ or 8.0.2+.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| fortiweb | 7.0.0 | 7.0.12 | vulnerable |
| fortiweb | 7.2.0 | 7.2.12 | vulnerable |
| fortiweb | 7.4.0 | 7.4.11 | vulnerable |
| fortiweb | 7.6.0 | 7.6.6 | vulnerable |
| fortiweb | 8.0.0 | 8.0.2 | vulnerable |
Fortinet has released firmware updates to address this OS command injection flaw. Organizations should prioritize upgrading to FortiWeb versions 7.0.12, 7.2.12, 7.4.11, 7.6.6, 8.0.2, or later to eliminate the vulnerability.
Identify and update all FortiWeb instances running vulnerable versions, including 7.0.x (up to 7.0.11), 7.2.x (up to 7.2.11), 7.4.x (up to 7.4.10), 7.6.x (up to 7.6.5), and 8.0.x (up to 8.0.1), to the latest secure firmware release.
Limit access to the FortiWeb management interface and CLI to trusted administrative networks only. Implement strong multi-factor authentication (MFA) and enforce strict role-based access control to reduce the risk of authenticated exploitation.
Review system logs for unusual CLI commands or suspicious HTTP requests targeting management endpoints. Look for unexpected outbound network connections from the FortiWeb appliance, which may indicate successful command injection or reverse shell activity.
Detection should focus on identifying anomalous administrative activity. Monitor FortiWeb audit logs for unusual shell commands or unexpected CLI usage by administrative accounts. Since the vulnerability involves crafted HTTP requests, inspect management interface logs for special characters such as semicolons, pipes, or backticks in input parameters. Additionally, monitor for unauthorized outbound traffic from the WAF appliance, which could signify post-exploitation command-and-control communication.
Experience superior visibility and a simpler approach to cyber risk management