November 20 Advisory: FortiWeb Vulnerability Allows Authenticated OS Command Injection [CVE-2025-58034]

Rapid Response

Vulnerability Description 

This is a medium severity vulnerability that could allow an authenticated attacker to execute code on a FortiWeb system by crafting HTTP requests or CLI commands. At the time of writing this, there is suspicion that this exploit is being chained with CVE-2025-64446, but no confirmation from any official sources. CVE-2025-58034 comes just five days after the announcement of the previous vulnerability. See the full Censys advisory for CVE-2025-64446. 

Map of assets potentially affected by CVE-2025-58034 broken down by country
Map of potentially affected hosts

See the full breakdown by country in Censys Platform –> 

FieldDescription
CVE-IDCVE-2025-58034 — CVSS 6.7 — assigned by Fortinet, Inc.
Vulnerability DescriptionA medium-severity vulnerability that could allow an authenticated attacker to execute code on a FortiWeb system by crafting HTTP requests or CLI commands. At time of writing, there is suspicion that this exploit is being chained with CVE-2025-64446, but no confirmation from official sources. 
Date of DisclosureNovember 18, 2025
Affected AssetsFortiWeb
Vulnerable Software Versions8.x: 8.0.0 – 8.0.17.6.x: 7.6.0 – 7.6.57.4.x: 7.4.0 – 7.4.107.2.x: 7.2.0 – 7.2.117.0.x: 7.0.0 – 7.0.11
PoC Available?CVE-2025-58034 is being exploited in the wild according to multiple sources linked in the references below, and CISA has added this to their Known Exploited Vulnerability Catalog as of November 18th, 2025. 
Exploitation StatusNo known exploitation at time of writing.
Patch StatusThe following versions of FortiWeb resolve this issue, according to Fortinet’s advisory FG-IR-25-513:FortiWeb 8.0.2FortiWeb 7.6.6FortiWeb 7.4.11FortiWeb 7.2.12FortiWeb 7.0.12

Censys Perspective

At the time of writing, Censys observes 22,246 exposed FortiWeb instances online, across all versions. These queries identify FortiWeb appliances but do not filter by version. They cannot confirm if a device is vulnerable because the specific version is not visible in the response data.

Platform:

((web.cert.parsed.subject.common_name: “FortiWeb” or web.cert.parsed.subject.organizational_unit: “FortiWeb”) and (web.software.vendor: “fortinet”)) and not web.labels.value: “HONEYPOT”

ASM (if applicable):

web_entity.instances.software.vendor:”fortinet” and (web_entity.instances.tls.certificate.parsed.issuer.common_name: “FortiWeb” or web_entity.instances.tls.certificate.parsed.issuer.organizational_unit: “FortiWeb”) and not web_entity.instances.labels={honeypot, tarpit}

Legacy Search:

services.software.vendor:”fortinet” and services: (tls.certificate.parsed.subject.common_name: “FortiWeb” or tls.certificate.parsed.subject.organizational_unit: “FortiWeb”) and not labels={`honeypot`, `tarpit`}

References

Subscribe to our blog