EUVD-2025-209452

| CVE-2025-61624 MEDIUM
2026-04-14 fortinet GHSA-f3vf-64gv-cxr8
6.0
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 14, 2026 - 17:06 vuln.today
CVSS Changed
Apr 14, 2026 - 16:22 NVD
5.4 (MEDIUM) 6.0 (MEDIUM)

DescriptionNVD

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands.

AnalysisAI

Path traversal vulnerability in Fortinet FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager allows authenticated administrators with read-write permissions to write or delete arbitrary files via malicious CLI commands, potentially compromising system integrity and availability across multiple Fortinet product lines. The vulnerability affects FortiOS 6.4 through 7.6.4, FortiProxy 7.0 through 7.6.4, FortiPAM 1.0 through 1.7.0, and FortiSwitchManager 7.0 through 7.2.7. With a CVSS score of 6.0 a

Technical ContextAI

The vulnerability stems from insufficient input validation in CLI command processing across multiple Fortinet products (FortiOS, FortiProxy, FortiPAM, FortiSwitchManager). CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) indicates that the affected CLI command handlers fail to properly sanitize or restrict file paths supplied by users, allowing directory traversal sequences (e.g., '../') to escape intended file boundaries. The attack surface is CLI-based, meaning it requires local or remote access to the command-line interface with authenticated credentials holding the admin profile and explicit read-write permissions. The local attack vector (AV:L) and high privilege requirement (PR:H) narrow the attack scope to authenticated administrators, but the integrity and availability impacts are significant-successful exploitation enables unauthorized file write/delete operations that can alter system configuration, disable security features, or cause denial of service.

RemediationAI

Organizations must apply vendor-released patches immediately. For FortiOS, upgrade to versions 7.6.5 or later (for 7.6.x branch), 7.4.10 or later (for 7.4.x branch), or equivalent patched versions for earlier branches; FortiProxy should be upgraded to 7.6.5 or later, 7.4.12 or later, or patched equivalents for 7.2.x and 7.0.x. FortiPAM should be upgraded to 1.7.1 or later; if running earlier versions (1.0-1.6), upgrade to the latest patched release for each branch or contact Fortinet support for backport patches. FortiSwitchManager should be upgraded to 7.2.8 or later or 7.0.7 or later depending on the branch. As an interim mitigation, organizations should restrict CLI access to trusted administrators, disable read-write CLI permissions for all non-essential admin accounts, enforce strong authentication for admin access, monitor and audit all CLI commands for path traversal attempts (looking for '../' or similar sequences), and review admin account permissions to ensure least-privilege principles are applied. Detailed remediation guidance is available at https://fortiguard.fortinet.com/psirt/FG-IR-26-122.

Share

EUVD-2025-209452 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy