CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
A server-side request forgery (ssrf) vulnerability [CWE-918] vulnerability in Fortinet FortiSOAR PaaS 7.6.4, FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.4, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated attacker to discover services running on local ports via crafted requests.
AnalysisAI
Server-side request forgery in Fortinet FortiSOAR (both PaaS and on-premise versions 7.3 through 7.6.4) allows authenticated attackers to discover services running on local ports by crafting malicious requests. The vulnerability requires valid user credentials and carries a CVSS score of 4.3 with low confidentiality impact; no public exploit code or active exploitation has been confirmed at this time.
Technical ContextAI
This server-side request forgery (SSRF) vulnerability exploits improper validation of user-supplied URLs in FortiSOAR's request handling mechanisms, classified under CWE-918. The affected products include both Fortinet FortiSOAR on-premise deployments and the cloud-based PaaS variant across multiple major versions (7.3 through 7.6.4). SSRF vulnerabilities in enterprise security orchestration platforms like FortiSOAR are particularly concerning because they operate within trusted network segments and often have access to internal services, APIs, and management interfaces that would normally be restricted to external attackers. The vulnerability requires an authenticated user context (PR:L in CVSS vector), meaning the attacker must possess valid credentials to exploit the flaw.
RemediationAI
Organizations must upgrade FortiSOAR installations to patched versions beyond those listed as affected (7.6.5 or later for 7.6.x branch, 7.5.3 or later for 7.5.x branch, 7.4.6 or later for 7.4.x branch, and 7.3.4 or later for 7.3.x branch); exact patch version confirmation should be verified against the Fortinet advisory at https://fortiguard.fortinet.com/psirt/FG-IR-26-103. For organizations unable to patch immediately, implement network-level access controls restricting FortiSOAR instances' outbound connections to only explicitly authorized internal services, and audit user access logs to FortiSOAR to identify and revoke unnecessary credentials for low-privilege accounts that do not require full platform access. Apply principle of least privilege by restricting user roles within FortiSOAR to the minimum required permissions.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209451
GHSA-r66p-45rw-5xc2