CVE-2025-31365
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-15

Assigner: Fortinet, Inc.

Description
An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientMac 7.4.0 through 7.4.3, 7.2.1 through 7.2.8 may allow an unauthenticated attacker to execute arbitrary code on the victim's host via tricking the user into visiting a malicious website.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-15
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
fortinet forticlient From 7.4.0 (inc) to 7.4.3 (inc)
fortinet forticlient From 7.4.0 (inc) to 7.4.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Code Injection flaw (CWE-94) in FortiClientMac versions 7.4.0 through 7.4.3 and 7.2.1 through 7.2.8. It allows an unauthenticated attacker to execute arbitrary code on the victim's host by tricking the user into visiting a malicious website.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can run arbitrary code on your system without authentication, potentially leading to unauthorized access, data compromise, or system disruption if a user is tricked into visiting a malicious website.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart