Vulnerability Details CVE-2025-22254
An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiWeb 7.6.0 through 7.6.1, FortiWeb 7.4.0 through 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to Node.js websocket module.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.7%
CVSS Severity
CVSS v3 Score 6.6
Products affected by CVE-2025-22254
-
cpe:2.3:a:fortinet:fortiproxy:7.4.0
-
cpe:2.3:a:fortinet:fortiproxy:7.4.1
-
cpe:2.3:a:fortinet:fortiproxy:7.4.2
-
cpe:2.3:a:fortinet:fortiproxy:7.4.3
-
cpe:2.3:a:fortinet:fortiproxy:7.4.4
-
cpe:2.3:a:fortinet:fortiproxy:7.4.5
-
cpe:2.3:a:fortinet:fortiproxy:7.4.6
-
cpe:2.3:a:fortinet:fortiproxy:7.4.7
-
cpe:2.3:a:fortinet:fortiproxy:7.6.0
-
cpe:2.3:a:fortinet:fortiproxy:7.6.1
-
cpe:2.3:a:fortinet:fortiweb:7.4.0
-
cpe:2.3:a:fortinet:fortiweb:7.4.1
-
cpe:2.3:a:fortinet:fortiweb:7.4.2
-
cpe:2.3:a:fortinet:fortiweb:7.4.3
-
cpe:2.3:a:fortinet:fortiweb:7.4.4
-
cpe:2.3:a:fortinet:fortiweb:7.4.5
-
cpe:2.3:a:fortinet:fortiweb:7.4.6
-
cpe:2.3:a:fortinet:fortiweb:7.6.0
-
cpe:2.3:a:fortinet:fortiweb:7.6.1
-
cpe:2.3:o:fortinet:fortios:6.4.0
-
cpe:2.3:o:fortinet:fortios:6.4.1
-
cpe:2.3:o:fortinet:fortios:6.4.10
-
cpe:2.3:o:fortinet:fortios:6.4.11
-
cpe:2.3:o:fortinet:fortios:6.4.12
-
cpe:2.3:o:fortinet:fortios:6.4.13
-
cpe:2.3:o:fortinet:fortios:6.4.14
-
cpe:2.3:o:fortinet:fortios:6.4.15
-
cpe:2.3:o:fortinet:fortios:6.4.2
-
cpe:2.3:o:fortinet:fortios:6.4.3
-
cpe:2.3:o:fortinet:fortios:6.4.4
-
cpe:2.3:o:fortinet:fortios:6.4.5
-
cpe:2.3:o:fortinet:fortios:6.4.6
-
cpe:2.3:o:fortinet:fortios:6.4.7
-
cpe:2.3:o:fortinet:fortios:6.4.8
-
cpe:2.3:o:fortinet:fortios:6.4.9
-
cpe:2.3:o:fortinet:fortios:7.0.0
-
cpe:2.3:o:fortinet:fortios:7.0.1
-
cpe:2.3:o:fortinet:fortios:7.0.10
-
cpe:2.3:o:fortinet:fortios:7.0.11
-
cpe:2.3:o:fortinet:fortios:7.0.12
-
cpe:2.3:o:fortinet:fortios:7.0.13
-
cpe:2.3:o:fortinet:fortios:7.0.14
-
cpe:2.3:o:fortinet:fortios:7.0.15
-
cpe:2.3:o:fortinet:fortios:7.0.16
-
cpe:2.3:o:fortinet:fortios:7.0.2
-
cpe:2.3:o:fortinet:fortios:7.0.3
-
cpe:2.3:o:fortinet:fortios:7.0.4
-
cpe:2.3:o:fortinet:fortios:7.0.5
-
cpe:2.3:o:fortinet:fortios:7.0.6
-
cpe:2.3:o:fortinet:fortios:7.0.7
-
cpe:2.3:o:fortinet:fortios:7.0.8
-
cpe:2.3:o:fortinet:fortios:7.0.9
-
cpe:2.3:o:fortinet:fortios:7.2.0
-
cpe:2.3:o:fortinet:fortios:7.2.1
-
cpe:2.3:o:fortinet:fortios:7.2.10
-
cpe:2.3:o:fortinet:fortios:7.2.2
-
cpe:2.3:o:fortinet:fortios:7.2.3
-
cpe:2.3:o:fortinet:fortios:7.2.4
-
cpe:2.3:o:fortinet:fortios:7.2.5
-
cpe:2.3:o:fortinet:fortios:7.2.6
-
cpe:2.3:o:fortinet:fortios:7.2.7
-
cpe:2.3:o:fortinet:fortios:7.2.8
-
cpe:2.3:o:fortinet:fortios:7.2.9
-
cpe:2.3:o:fortinet:fortios:7.4.0
-
cpe:2.3:o:fortinet:fortios:7.4.1
-
cpe:2.3:o:fortinet:fortios:7.4.2
-
cpe:2.3:o:fortinet:fortios:7.4.3
-
cpe:2.3:o:fortinet:fortios:7.4.4
-
cpe:2.3:o:fortinet:fortios:7.4.5
-
cpe:2.3:o:fortinet:fortios:7.4.6
-
cpe:2.3:o:fortinet:fortios:7.6.0
-
cpe:2.3:o:fortinet:fortios:7.6.1