On November 19, 2025, Fortinet disclosed CVE-2025-58034, a critical OS command injection vulnerability in its FortiWeb Web Application Firewall (WAF) product line. The zero-day flaw is being actively exploited in the wild, allowing authenticated attackers to execute arbitrary commands with the privileges of the web server process. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and issued an emergency directive with an aggressive seven-day patching deadline for federal agencies, highlighting the significant risk it poses. Security researchers have already observed around 2,000 exploitation attempts. There is a high risk that this vulnerability could be chained with other flaws, such as the recent authentication bypass CVE-2025-64446, to enable unauthenticated remote code execution (RCE) attacks against internet-facing devices.
CVE-2025-58034 is an OS command injection vulnerability affecting FortiWeb WAFs. An attacker with valid credentials for the device's management interface can execute arbitrary operating system commands by sending specially crafted HTTP requests or using CLI commands. The root cause lies in insufficient input sanitization within the management interface, allowing command-chaining characters (e.g., ;, |, &&) to be passed to the underlying shell.
Fortinet has confirmed the vulnerability affects its FortiWeb product line. While specific version numbers were not detailed in the initial reports, organizations using any version of FortiWeb should assume they are vulnerable and consult Fortinet's security advisory for patched versions. The flaw impacts all form factors, including hardware appliances, virtual machines, and cloud-based instances.
Both Fortinet and CISA have confirmed that CVE-2025-58034 is being actively exploited in the wild. Security vendor Trend Micro, credited with the discovery, reported approximately 2,000 detections of exploitation attempts. The primary concern is the potential for this vulnerability to be chained with CVE-2025-64446, a recently disclosed authentication bypass in the same product. If chained, an unauthenticated attacker could gain full control over a vulnerable FortiWeb appliance, a highly attractive target for threat actors seeking to compromise network traffic or pivot into protected networks.
A successful exploit of CVE-2025-58034 allows an attacker to gain full control over the FortiWeb appliance. This can lead to several severe consequences:
Security teams should hunt for signs of exploitation attempts targeting FortiWeb appliances. These are not confirmed IOCs but expert-generated indicators for hunting.
| Type | Value | Description |
|---|---|---|
url_pattern |
*/api/v2.0/system/maintenance/firmware |
A common endpoint for system commands that could be abused. |
command_line_pattern |
uname -a; id; ls -la |
Attackers often run basic reconnaissance commands post-exploitation. Look for these in shell logs on the appliance. |
log_source |
FortiWeb Event Logs |
Monitor for anomalous administrator logins, especially from unusual IP addresses, followed by configuration changes or system commands. |
network_traffic_pattern |
Outbound connections from FortiWeb management IP |
Watch for unexpected outbound connections (e.g., to Pastebin, GitHub, or unknown IPs) from the appliance's management interface, which could indicate a reverse shell or data exfiltration. |
;, |, &&, $(...)).sh, bash, or curl being spawned by the web server process.whoami, id, uname, or network enumeration tools like netstat.M1051 - Update Software mitigation.M1035 - Limit Access to Resource Over Network.M1032 - Multi-factor Authentication.Fortinet patches FortiWeb WAF CVE-2025-58034; Metasploit module released, increasing exploitation risk for 7.x/8.x versions.
Fortinet has officially patched the actively exploited CVE-2025-58034 in FortiWeb WAF, affecting 7.x and 8.x versions. The vulnerability was initially 'stealth-patched' in routine updates before public disclosure. A critical development is the release of an exploit module for this flaw in the Metasploit framework. This significantly lowers the technical barrier for exploitation, making it accessible to a wider range of threat actors and dramatically increasing the likelihood of widespread attacks. Organizations are urged to apply patches immediately due to the heightened risk.
Fortinet confirms CVE-2025-58034 (medium severity) chains with CVE-2025-64446 (path traversal) for unauthenticated RCE. Patched versions released.
Fortinet has provided critical updates regarding the actively exploited FortiWeb zero-day, CVE-2025-58034. While rated medium severity (CVSS 6.7) in isolation, it can be chained with the previously disclosed path-traversal vulnerability, CVE-2025-64446, to achieve unauthenticated remote code execution. This chain allows attackers to bypass authentication, create an admin account, and then exploit CVE-2025-58034 for full system takeover. Fortinet has released specific patched versions, including 7.0.12, 7.2.12, 7.4.11, 7.6.6, and 8.0.2, urging immediate upgrades. Widespread scanning for CVE-2025-64446 has been detected, indicating active targeting. New detection methods include monitoring for unauthorized admin account creation and web server processes spawning shells.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats