FortiWeb Systems Compromised via Webshells After Public PoC Release

FortiWeb Systems Compromised via Webshells After Public PoC Release

A widespread cyberattack campaign has successfully compromised dozens of Fortinet FortiWeb instances through webshell deployment, exploiting a critical vulnerability for which proof-of-concept code became publicly available just days ago.

The rapid weaponization of the exploit demonstrates the immediate risks organizations face when security flaws become public knowledge.

Critical Vulnerability Details and Impact

The attacks center around CVE-2025-25257, a critical pre-authenticated SQL injection vulnerability affecting Fortinet’s FortiWeb Web Application Firewall systems.

This flaw, with a severe CVSS score of 9.6 out of 10, allows unauthenticated attackers to execute unauthorized code remotely by sending specially crafted HTTP requests to vulnerable systems.

The vulnerability resides specifically in the FortiWeb Fabric Connector component, which integrates the WAF with other Fortinet security products.

Security researcher Kentaro Kawane of GMO Cybersecurity discovered the flaw, which Fortinet disclosed on July 8, 2025.

However, the security landscape changed dramatically on July 11 when cybersecurity firm WatchTowr and co-discoverers published proof-of-concept exploits.

These exploits demonstrated how attackers could leverage SQL injection techniques to plant webshells or establish reverse shells on vulnerable devices, providing persistent access and control.

The Shadowserver Foundation, a prominent threat monitoring organization, has been tracking the exploitation campaign since it began on July 11. Their latest data reveals concerning statistics about the scope of compromised systems:

Metric Count Details
Confirmed Compromised Instances 77 Down from 85 the previous day
Additional Exposed Systems 223 Patch status unconfirmed
Most Affected Country United States 40 compromised devices
Other Significantly Affected Netherlands, Singapore, UK Multiple compromised systems each
Vulnerability CVSS Score 9.6/10 Critical severity rating
Public Exploit Release Date July 11, 2025 Same day active exploitation began

Fortinet has responded swiftly to the threat by releasing patches and providing guidance for affected customers.

The company strongly urges immediate upgrades to secure versions, including FortiWeb 7.6.4, 7.4.8, 7.2.11, or 7.0.11 and later releases.

For organizations unable to implement patches immediately, Fortinet recommends disabling the HTTP/HTTPS administrative interface as a temporary workaround to block the primary attack vector.

The current campaign underscores cybersecurity experts’ concerns about the rapid weaponization of public exploits.

With FortiWeb systems serving as critical security infrastructure for large enterprises and government agencies, the compromise of these devices represents a significant security risk that extends beyond the immediate victims to the organizations and applications they protect.

The decrease from 85 to 77 confirmed compromised instances suggests some organizations are successfully implementing remediation measures, though the 223 additional exposed systems remain a significant concern for the cybersecurity community.

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now




Source link