🔐 CVE Alert

CVE-2025-22862

MEDIUM 6.3
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

CWE CWE-288
Vendor fortinet
Product fortiproxy
Ecosystems
Industries
NetworkingSecurity
Published Oct 2, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for fortinet fortiproxy

Be the first to know when new medium vulnerabilities affecting fortinet fortiproxy are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Fortinet / FortiProxy
7.6.0 ≤ 7.6.2 7.4.0 ≤ 7.4.8 7.2.0 ≤ 7.2.15 7.0.5 ≤ 7.0.22
Fortinet / FortiOS
7.4.0 ≤ 7.4.7 7.2.0 ≤ 7.2.11 7.0.6 ≤ 7.0.18

References

NVD ↗ CVE.org ↗ EPSS Data ↗
fortiguard.fortinet.com: https://fortiguard.fortinet.com/psirt/FG-IR-24-385