Rewterz
Apache OpenOffice Flaws Allow Memory Corruption and Content Loading
November 13, 2025
How MSSPs Can Strengthen Security Posture with Threat Hunting Services
November 14, 2025

FortiWeb Auth Bypass Flaw Actively Exploited

Severity

High

Analysis Summary

Threat actors are actively exploiting a critical authentication bypass vulnerability in Fortinet’s FortiWeb Web Application Firewall (CVE-2025-52970), allowing attackers to log in as any existing user through crafted requests. The flaw caused by improper parameter handling carries a CVSS score of high and, while requiring some non-public knowledge, still poses severe risks such as privilege escalation and potential remote code execution. Since the vulnerability affects widely deployed WAF appliances, the global exploitation activity has rapidly increased, putting many organizations at immediate risk.

The surge in attacks began after a partial proof-of-concept exploit was leaked publicly in August 2025, enabling threat actors to target exposed FortiWeb instances indiscriminately. Despite Fortinet releasing patches in version 8.0.2 and later, many organizations continue to run outdated devices, leading to dozens of confirmed compromises reported by security researchers. The active exploitation highlights how quickly attackers adapt and weaponize new vulnerabilities, especially in critical edge devices like WAFs that guard sensitive web assets.

To support defenders, watchTowr Labs released an open-source Detection Artefact Generator that helps identify vulnerable FortiWeb appliances. The Python-based tool simulates the authentication bypass by generating a random username and password, then sending an exploit request to a target IP (e.g., python watchTowr-vs-Fortiweb-AuthBypass.py 192.168.1.99). If the exploit succeeds, the script creates a temporary user, clearly confirming the appliance is at risk. The tool specifically targets FortiWeb versions below 8.0.2 and is publicly available on GitHub.

Given the ongoing exploitation campaigns, security teams must prioritize scanning all internet-facing FortiWeb devices, applying updated patches, and monitoring for unusual authentication activity. Organizations should review logs for unexpected user creations or suspicious login attempts, as these may indicate attempted or successful exploitation. As WAFs increasingly become the focus of sophisticated supply chain and perimeter-targeting attacks, tools like watchTowr’s detector play a crucial role in empowering defenders to respond rapidly and maintain resilient security postures.

Impact

  • Gain Access
  • Privilege Escalation
  • Code Execution

Indicators of Compromise

CVE

  • CVE-2025-52970

Affected Vendors

  • Fortinet

Remediation

  • Immediately update FortiWeb to version 8.0.2 or later, as this is the only permanent fix for CVE-2025-52970.
  • Scan all internet-facing FortiWeb appliances using the watchTowr Detection Artefact Generator to identify vulnerable systems.
  • Disable external access to the FortiWeb management interface until patching is fully completed.
  • Review authentication logs for anomalies, including unexpected user creations or suspicious login attempts.
  • Remove any unauthorized accounts that may have been created through exploitation attempts.
  • Enable strict network segmentation, ensuring FortiWeb appliances are not directly exposed to the public internet unless absolutely required.
  • Apply additional hardening configurations, such as strong access control policies and IP whitelisting for admin interfaces.
  • Monitor for signs of privilege escalation or remote code execution, especially unusual system changes or configuration modifications.
  • Conduct a full incident response review if exploitation is suspected, including checking for persistence mechanisms or lateral movement.
  • Stay updated with Fortinet PSIRT advisories to ensure timely awareness of patches, exploit activity, and mitigation guidance.