CVE-2025-22862Authentication Bypass Using an Alternate Path or Channel in Fortinet Fortios

Severity
6.7MEDIUMNVD
EPSS
0.0%
top 94.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 2

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages4 packages

NVDfortinet/fortios7.0.67.2.12+1
NVDfortinet/fortiproxy7.0.57.4.9+1
CVEListV5fortinet/fortios7.4.07.4.7+2
CVEListV5fortinet/fortiproxy7.6.07.6.2+3

🔴Vulnerability Details

2
GHSA
GHSA-w9rm-93rw-98gq: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 72025-10-02
CVEList
CVE-2025-22862: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 72025-10-02

📋Vendor Advisories

1
Fortinet
Privilege escalation in automation-stitch2025-10-02
CVE-2025-22862 — Fortinet Fortios vulnerability | cvebase