CVE-2025-61624
Summary
| CVE | CVE-2025-61624 |
|---|---|
| State | PUBLISHED |
| Assigner | fortinet |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-14 16:16:31 UTC |
| Updated | 2026-04-22 19:12:49 UTC |
| Description | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
EPSS: 0.000320000 probability, percentile 0.094020000 (date 2026-04-21)
Problem Types: CWE-22 | CWE-22 Escalation of privilege
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
| 3.1 | [email protected] | Secondary | 6 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
| 3.1 | CNA | CVSS | 5.4 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C |
CVSS v3.1 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Fortinet | FortiOS | affected 7.6.0 7.6.4 semver | Not specified |
| CNA | Fortinet | FortiOS | affected 7.4.0 7.4.9 semver | Not specified |
| CNA | Fortinet | FortiOS | affected 7.2.0 7.2.13 semver | Not specified |
| CNA | Fortinet | FortiOS | affected 7.0.0 7.0.19 semver | Not specified |
| CNA | Fortinet | FortiOS | affected 6.4.0 6.4.16 semver | Not specified |
| CNA | Fortinet | FortiProxy | affected 7.6.0 7.6.4 semver | Not specified |
| CNA | Fortinet | FortiProxy | affected 7.4.0 7.4.11 semver | Not specified |
| CNA | Fortinet | FortiProxy | affected 7.2.0 7.2.16 semver | Not specified |
| CNA | Fortinet | FortiProxy | affected 7.0.0 7.0.23 semver | Not specified |
| CNA | Fortinet | FortiSwitchManager | affected 7.2.0 7.2.7 semver | Not specified |
| CNA | Fortinet | FortiSwitchManager | affected 7.0.0 7.0.6 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.7.0 | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.6.0 1.6.2 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.5.0 1.5.1 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.4.0 1.4.3 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.3.0 1.3.1 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.2.0 | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.1.0 1.1.2 semver | Not specified |
| CNA | Fortinet | FortiPAM | affected 1.0.0 1.0.3 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| fortiguard.fortinet.com/psirt/FG-IR-26-122 | [email protected] | fortiguard.fortinet.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Additional Advisory Data
Solutions
CNA: Upgrade to upcoming FortiOS version 8.0.0 or above Upgrade to FortiOS version 7.6.5 or above Upgrade to FortiOS version 7.4.10 or above Upgrade to FortiProxy version 7.6.5 or above Upgrade to FortiProxy version 7.4.12 or above Upgrade to FortiPAM version 1.8.0 or above Upgrade to FortiPAM version 1.7.1 or above Fortinet remediated this issue in FortiSASE version 25.4.b and hence customers do not need to perform any action. Upgrade to upcoming FortiSwitch version 8.0.0 or above Upgrade to FortiSwitch version 7.6.5 or above Upgrade to FortiSwitch version 7.4.9 or above Upgrade to FortiSwitchManager version 7.2.8 or above Upgrade to FortiSwitchManager version 7.0.7 or above