CVE-2025-61624
Received Received - Intake
Path Traversal in Fortinet FortiOS and FortiPAM Allows File Manipulation

Publication date: 2026-04-14

Last updated on: 2026-04-22

Assigner: Fortinet, Inc.

Description
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
fortinet fortios From 7.6.0 (inc) to 7.6.5 (exc)
fortinet fortios From 6.4.0 (inc) to 7.4.10 (exc)
fortinet fortipam From 1.0.0 (inc) to 1.7.1 (exc)
fortinet fortiproxy From 7.0.0 (inc) to 7.4.12 (exc)
fortinet fortiproxy From 7.6.0 (inc) to 7.6.5 (exc)
fortinet fortiswitchmanager From 7.0.0 (inc) to 7.0.7 (exc)
fortinet fortiswitchmanager From 7.2.0 (inc) to 7.2.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability allows an attacker with sufficient privileges to write or delete arbitrary files on the system. This can lead to unauthorized modification or deletion of critical files, potentially disrupting system operations, causing data loss, or enabling further attacks. Since the attacker must have admin profile and read-write permissions, the impact is significant in environments where such access is granted.


Can you explain this vulnerability to me?

This vulnerability is an Improper Limitation of a Pathname to a Restricted Directory, also known as a Path Traversal vulnerability (CWE-22). It affects multiple versions of Fortinet products including FortiOS, FortiPAM, FortiProxy, and FortiSwitchManager. An authenticated attacker with an admin profile and at least read-write permissions can exploit this vulnerability by using specific CLI commands to write or delete arbitrary files on the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart