Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25257 PoC — Fortinet FortiWeb SQL注入漏洞

Source
Associated Vulnerability
Title:Fortinet FortiWeb SQL注入漏洞 (CVE-2025-25257)
Description:An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
Description
Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.
Readme

## Table of Contents

- [Overview](#overview)
- [Vulnerability Details](#vulnerability-details)
- [Proof of Concept (PoC)](#proof-of-concept-poc)
- [Trolled2](#environment-setup)
- [Trolled3](#mitigation-and-patching)

---

## Overview

CVE-2025-25257 is a **pre-authentication SQL Injection vulnerability** in Fortinet FortiWeb Fabric Connector versions 7.0 through 7.6.x.  
This flaw allows attackers to inject malicious SQL commands into the vulnerable API endpoint, potentially leading to **Remote Code Execution (RCE)**.  

This repository contains an **PoC** demonstrating the SQL injection vector in a safe and controlled manner.  
Its open source for you to exploit.-

---

## Vulnerability Details

- **Name:** FortiWeb Fabric Connector SQL Injection  
- **CVE:** [CVE-2025-25257](https://nvd.nist.gov/vuln/detail/CVE-2025-25257)  
- **Affected Versions:** FortiWeb Fabric Connector 7.0 through 7.6.x  
- **Severity:** Critical (CVSS Score 9.8)  
- **Impact:** Pre-authentication SQL Injection, leading to Remote Code Execution  
- **Attack Vector:** HTTP API `/api/fabric/device/status`  
- **Exploitation:** Requires malicious `Authorization: Bearer` header with crafted payload  

---

## Proof of Concept (PoC)

The following `curl` command demonstrates the **SQL Injection detection** *you can* executing harmful payloads:

```bash
curl -k -H "Authorization: Bearer aaa' OR '1'='1" \
  https://<fortiweb-ip>/api/fabric/device/status
File Snapshot

[4.0K] /data/pocs/abe3de350380c2fe95b502bdbded82165d616377 ├── [4.0K] java │   └── [ 808] poc.js ├── [1.4K] README.md └── [4.0K] src ├── [ 613] detect.py └── [ 741] poc.py 2 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →