FortiOS/FortiProxy Auth Bypass via Alternate Path (7.4.07.4.7)
CVE-2025-22862 Published on October 2, 2025
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.
Vulnerability Analysis
CVE-2025-22862 is exploitable with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Authentication Bypass Using an Alternate Path or Channel
A product requires authentication, but the product has an alternate path or channel that does not require authentication.
Products Associated with CVE-2025-22862
stack.watch emails you whenever new vulnerabilities are published in Fortinet FortiOS or Fortinet FortiProxy. Just hit a watch button to start following.
Affected Versions
Fortinet FortiProxy:- Version 7.6.0, <= 7.6.2 is affected.
- Version 7.4.0, <= 7.4.8 is affected.
- Version 7.2.0, <= 7.2.15 is affected.
- Version 7.0.5, <= 7.0.22 is affected.
- Version 7.4.0, <= 7.4.7 is affected.
- Version 7.2.0, <= 7.2.11 is affected.
- Version 7.0.6, <= 7.0.18 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.