- Description
- A Relative Path Traversal vulnerability [CWE-23] in FortiWeb 7.6.0 through 7.6.4, 7.4.0 through 7.4.8, 7.2.0 through 7.2.11, 7.0.2 through 7.0.11 may allow an authenticated attacker to perform an arbitrary file read on the underlying system via crafted requests.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- fortiweb
CVSS 3.1
- Type
- Secondary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- psirt@fortinet.com
- CWE-23
- Hype score
- Not currently trending
Fortinet FortiWeb _cmf_get_config_file_path Directory Traversal Information Disclosure Vulnerability (CVE-2025-53609) #CVE202553609 #CyberSecurity #DirectoryTraversalVulnerability #FortinetFortiWeb https://t.co/xGGGQUZUt1 https://t.co/Crl4Bh4D53
@SystemTek_UK
29 Sept 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-53609 Authenticated Relative Path Traversal Vulnerability in FortiWeb Web Application Firewall https://t.co/67yaf3QUa1
@VulmonFeeds
9 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-53609 A Relative Path Traversal vulnerability [CWE-23] in FortiWeb 7.6.0 through 7.6.4, 7.4.0 through 7.4.8, 7.2.0 through 7.2.11, 7.0.2 through 7.0.11 may allow an authent… https://t.co/87CBNb06Gs
@CVEnew
9 Sept 2025
248 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D3130A-BFAC-4C36-9F11-C90B919BD744",
"versionEndExcluding": "7.2.12",
"versionStartIncluding": "7.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB2FF56-D1ED-4EB5-B4D8-8FEDE1A521C8",
"versionEndExcluding": "7.4.9",
"versionStartIncluding": "7.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D358CE92-A30D-4058-8D12-00376E4B9074",
"versionEndExcluding": "7.6.5",
"versionStartIncluding": "7.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]