First published: Tue Feb 11 2025(Updated: )
An Improper Resolution of Path Equivalence vulnerability [CWE-41] in FortiPortal 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to retrieve source code via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | >=7.4.0<=7.4.2>=7.2.0<7.2.7>=7.0.0<7.0.12 |
Please upgrade to FortiPortal version 7.4.3 or above Please upgrade to FortiPortal version 7.2.7 or above Please upgrade to FortiPortal version 7.0.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24470 is considered a high severity vulnerability due to its potential for remote code retrieval by unauthenticated attackers.
To fix CVE-2025-24470, ensure you update FortiPortal to versions 7.4.3 or later, 7.2.7 or later, or 7.0.12 or later.
CVE-2025-24470 affects FortiPortal versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, and 7.0.0 through 7.0.11.
With CVE-2025-24470, attackers can exploit the vulnerability to retrieve sensitive source code through specially crafted HTTP requests.
The primary mitigation for CVE-2025-24470 is to apply the recommended software updates as soon as possible.