{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-25256","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2025-02-05T13:31:18.867Z","datePublished":"2025-08-12T18:59:14.863Z","dateUpdated":"2026-02-26T17:48:59.921Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSIEM","cpes":[],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.3.0","lessThanOrEqual":"7.3.1","status":"affected"},{"versionType":"semver","version":"7.2.0","lessThanOrEqual":"7.2.5","status":"affected"},{"versionType":"semver","version":"7.1.0","lessThanOrEqual":"7.1.7","status":"affected"},{"versionType":"semver","version":"7.0.0","lessThanOrEqual":"7.0.3","status":"affected"},{"versionType":"semver","version":"6.7.0","lessThanOrEqual":"6.7.9","status":"affected"},{"versionType":"semver","version":"6.6.0","lessThanOrEqual":"6.6.5","status":"affected"},{"versionType":"semver","version":"6.5.0","lessThanOrEqual":"6.5.3","status":"affected"},{"versionType":"semver","version":"6.4.0","lessThanOrEqual":"6.4.4","status":"affected"},{"versionType":"semver","version":"6.3.0","lessThanOrEqual":"6.3.3","status":"affected"},{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.1","status":"affected"},{"versionType":"semver","version":"6.1.0","lessThanOrEqual":"6.1.2","status":"affected"},{"version":"5.4.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2025-08-12T18:59:14.863Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Escalation of privilege","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiSIEM version 7.4.0 or above \nPlease upgrade to FortiSIEM version 7.3.2 or above \nPlease upgrade to FortiSIEM version 7.2.6 or above \nPlease upgrade to FortiSIEM version 7.1.8 or above \nPlease upgrade to FortiSIEM version 7.0.4 or above \nPlease upgrade to FortiSIEM version 6.7.10 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-152","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-152"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-25256","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-08-16T03:55:47.686767Z"}}}],"references":[{"url":"https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256","tags":["exploit"]},{"url":"https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256/","tags":["technical-description"]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:48:59.921Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-08-13T20:12:32.941Z"},"references":[{"url":"https://www.theregister.com/2025/08/13/fortinet_discloses_critical_bug/"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}