CVE-2025-24470
Published: 11 February 2025
Description
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Security Summary
CVE-2025-24470 is an Improper Resolution of Path Equivalence vulnerability (CWE-41) in FortiPortal versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, and 7.0.0 through 7.0.11. This issue enables a remote unauthenticated attacker to retrieve source code via crafted HTTP requests. The vulnerability carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting its high severity stemming from network-based access, low attack complexity, no required privileges or user interaction, changed scope, and high confidentiality impact.
A remote unauthenticated attacker can exploit CVE-2025-24470 by sending specially crafted HTTP requests to an affected FortiPortal instance accessible over the network. Successful exploitation allows the attacker to retrieve source code, potentially disclosing sensitive application logic, configurations, or other proprietary information without impacting integrity or availability.
Mitigation details are provided in the Fortinet PSIRT advisory FG-IR-25-015, available at https://fortiguard.fortinet.com/psirt/FG-IR-25-015. Security practitioners should consult this reference for patch information and recommended remediation steps.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability in the public-facing FortiPortal web application directly enables remote unauthenticated exploitation for initial access (T1190) and retrieval of source code as data from the local system (T1005).