{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortiweb", "versions": [{"status": "affected", "version": "7.0.0", "lessThan": "7.0.11", "versionType": "custom"}, {"status": "affected", "version": "7.2.0", "lessThan": "7.2.11", "versionType": "custom"}, {"status": "affected", "version": "7.4.0", "lessThan": "7.4.8", "versionType": "custom"}, {"status": "affected", "version": "7.6.0", "lessThan": "7.6.4", "versionType": "custom"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://packetstorm.news/files/id/210193/", "tags": ["exploit", "third-party-advisory", "vdb-entry"]}, {"url": "https://www.exploit-db.com/exploits/52473", "tags": ["exploit", "third-party-advisory", "vdb-entry"]}, {"url": "https://github.com/0xbigshaq/CVE-2025-25257", "tags": ["third-party-advisory"]}, {"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-151", "tags": ["vendor-advisory"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-25257", "tags": ["x_us-government-resource"]}], "descriptions": [{"lang": "en", "value": "An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests."}, {"lang": "es", "value": "Una vulnerabilidad de neutralización incorrecta de elementos especiales utilizados en un comando SQL ('Inyección SQL') [CWE-89] en Fortinet FortiWeb versión 7.6.0 a 7.6.3, 7.4.0 a 7.4.7, 7.2.0 a 7.2.10 y anteriores a 7.0.10 permite a un atacante no autenticado ejecutar código o comandos SQL no autorizados a través de solicitudes HTTP o HTTPS manipulada."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-89", "description": "CWE-89"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-07-17T16:15:34Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-25257", "state": "PUBLISHED", "dateUpdated": "2026-02-20T16:49:01Z", "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "datePublished": "2025-07-17T16:15:34Z", "assignerShortName": "fortinet"}, "dataVersion": "5.0"}