FortiOS 7.6.1-7.0 Sensitive Info Leak via HTTP Symlink Bypass
CVE-2025-68686 Published on February 10, 2026
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions may allow a remote unauthenticated attacker to bypass the patch developed for the symbolic link persistency mechanism observed in some post-exploit cases, via crafted HTTP requests. An attacker would need first to have compromised the product via another vulnerability, at filesystem level.
Vulnerability Analysis
CVE-2025-68686 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2025-68686 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2025-68686
Want to know whenever a new CVE is published for Fortinet FortiOS? stack.watch will email you.
Affected Versions
Fortinet FortiOS:- Version 7.6.0, <= 7.6.1 is affected.
- Version 7.4.0, <= 7.4.6 is affected.
- Version 7.2.0, <= 7.2.13 is affected.
- Version 7.0.0, <= 7.0.19 is affected.
- Version 6.4.0, <= 6.4.16 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.