{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2025-58034", "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "state": "PUBLISHED", "assignerShortName": "fortinet", "dateReserved": "2025-08-22T13:55:12.100Z", "datePublished": "2025-11-18T17:01:13.513Z", "dateUpdated": "2025-11-21T13:44:17.238Z" }, "containers": { "cna": { "affected": [ { "vendor": "Fortinet", "product": "FortiWeb", "cpes": [ "cpe:2.3:a:fortinet:fortiweb:7.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:7.0.2:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "versions": [ { "versionType": "semver", "version": "7.6.0", "lessThanOrEqual": "7.6.4", "status": "affected" }, { "versionType": "semver", "version": "7.4.0", "lessThanOrEqual": "7.4.8", "status": "affected" }, { "versionType": "semver", "version": "7.2.0", "lessThanOrEqual": "7.2.11", "status": "affected" }, { "versionType": "semver", "version": "7.0.2", "lessThanOrEqual": "7.0.11", "status": "affected" } ] } ], "descriptions": [ { "lang": "en", "value": "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands." } ], "providerMetadata": { "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet", "dateUpdated": "2025-11-21T13:44:17.238Z" }, "problemTypes": [ { "descriptions": [ { "lang": "en", "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "type": "CWE" } ] } ], "metrics": [ { "format": "CVSS", "cvssV3_1": { "version": "3.1", "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C" } } ], "solutions": [ { "lang": "en", "value": "Upgrade to FortiWeb version 8.0.2 or above\nUpgrade to upcoming FortiWeb version 7.6.6 or above\nUpgrade to upcoming FortiWeb version 7.4.11 or above\nUpgrade to FortiWeb version 7.2.12 or above\nUpgrade to FortiWeb version 7.0.12 or above" } ], "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-513", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-513" } ] }, "adp": [ { "references": [ { "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-58034", "tags": [ "government-resource" ] } ], "metrics": [ { "other": { "type": "ssvc", "content": { "timestamp": "2025-11-18T00:00:00+00:00", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "version": "2.0.3", "id": "CVE-2025-58034" } } }, { "other": { "type": "kev", "content": { "dateAdded": "2025-11-18", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-58034" } } } ], "title": "CISA ADP Vulnrichment", "providerMetadata": { "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-11-19T04:55:37.299Z" }, "timeline": [ { "time": "2025-11-18T00:00:00+00:00", "lang": "en", "value": "CVE-2025-58034 added to CISA KEV" } ] } ] } }