Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25257

CVSS 9.6 · Critical KEV EPSS 22.11% · P96
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-25257

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fortinet FortiWeb SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fortinet FortiWeb是美国飞塔(Fortinet)公司的一款Web应用层防火墙,它能够阻断如跨站点脚本、SQL注入、Cookie中毒、schema中毒等攻击的威胁,保证Web应用程序的安全性并保护敏感的数据库内容。 Fortinet FortiWeb 7.6.3及之前版本、7.4.7及之前版本、7.2.10及之前版本和7.0.10之前版本存在SQL注入漏洞,该漏洞源于对SQL命令中特殊元素中和不当,可能导致SQL注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
FortinetFortiWeb 7.6.0 ~ 7.6.3 cpe:2.3:a:fortinet:fortiweb:7.6.3:*:*:*:*:*:*:*

II. Public POCs for CVE-2025-25257

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257POC Details
2FortiWeb CVE-2025-25257 exploithttps://github.com/0xbigshaq/CVE-2025-25257POC Details
3Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.https://github.com/adilburaksen/CVE-2025-25257-Exploit-ToolPOC Details
4Nonehttps://github.com/imbas007/CVE-2025-25257POC Details
5CVE-2025-25257https://github.com/B1ack4sh/Blackash-CVE-2025-25257POC Details
6PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated.https://github.com/0xgh057r3c0n/CVE-2025-25257POC Details
7Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.https://github.com/aitorfirm/CVE-2025-25257POC Details
8CVE‑2025‑25257 is a critical pre-authentication SQL injection vulnerability affecting Fortinet FortiWeb’shttps://github.com/mrmtwoj/CVE-2025-25257POC Details
9Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCEhttps://github.com/TheStingR/CVE-2025-25257POC Details
10An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-25257.yamlPOC Details
11A working (at least for me :] ) exploit for CVE-2025-25257https://github.com/segfault-it/CVE-2025-25257POC Details
12🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write.https://github.com/kityzed2003/CVE-2025-25257POC Details
13PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated.https://github.com/zr1p3r/CVE-2025-25257POC Details
14Nonehttps://github.com/silentexploitexe/CVE-2025-25257POC Details
15CVE-2025-25257 PoC for educational use and/or authorised pentesting.https://github.com/mr-r3b00t/CVE-2025-25257POC Details
16CVE-2025-25257https://github.com/Ashwesker/Blackash-CVE-2025-25257POC Details
17Nonehttps://github.com/lytianahkone-boop/cve-2025-25257POC Details
18CVE-2025-25257https://github.com/Ashwesker/Ashwesker-CVE-2025-25257POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-25257

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-25257

No comments yet


Leave a comment