CVE-2025-22862
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.
| CWE | CWE-288 |
| Vendor | fortinet |
| Product | fortiproxy |
| Ecosystems | |
| Industries | NetworkingSecurity |
| Published | Oct 2, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for fortinet fortiproxy
Be the first to know when new medium vulnerabilities affecting fortinet fortiproxy are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Fortinet / FortiProxy
7.6.0 ≤ 7.6.2 7.4.0 ≤ 7.4.8 7.2.0 ≤ 7.2.15 7.0.5 ≤ 7.0.22
Fortinet / FortiOS
7.4.0 ≤ 7.4.7 7.2.0 ≤ 7.2.11 7.0.6 ≤ 7.0.18