First published: Tue May 13 2025(Updated: )
A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited arbitrary file write on the system via upload requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet EMS | >=7.4.0<=7.4.1 | |
Fortinet FortiClient EMS Cloud | >=7.4.0<=7.4.1 |
Please upgrade to FortiClientEMS Cloud version 7.4.3 or above Please upgrade to FortiClientEMS version 7.4.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22859 is considered a high severity vulnerability that could allow remote unauthenticated attackers to perform arbitrary file writes.
To fix CVE-2025-22859, users should upgrade to FortiClientEMS and FortiClientEMS Cloud versions 7.4.2 or later.
CVE-2025-22859 affects users of FortiClientEMS versions 7.4.0 through 7.4.1 and FortiClientEMS Cloud versions 7.4.0 through 7.4.1.
CVE-2025-22859 allows an attacker to exploit relative path traversal to perform limited arbitrary file writes on the affected systems.
No, CVE-2025-22859 can be exploited by remote unauthenticated attackers.