Fortinet Frenzy: Hackers Exploit Critical Flaw Faster Than You Can Say “Patch It!”
Hackers eagerly jumped at the chance to exploit CVE-2025-25257, an SQL injection flaw in Fortinet FortiWeb, moments after the proof-of-concept was shared. The rush to exploit this vulnerability was so swift, you’d think it was a Black Friday sale on server breaches. Fortinet users, update now or face the SQL storm!

Hot Take:
Is it just me, or does it seem like hackers have a sixth sense for exploiting vulnerabilities the moment a patch drops? Fortinet’s FortiWeb is now on the hackers’ menu, with SQL injections as the main course. Perhaps it’s time to treat these patches like hotcakes and serve them up faster than a hacker can say “unauthenticated access”!
Key Points:
- Fortinet’s FortiWeb has a critical vulnerability (CVE-2025-25257) with a CVSS score of 9.6.
- The flaw is an SQL injection issue allowing unauthenticated attackers to run unauthorized SQL code.
- Fortinet released patches on July 8, but hackers began exploiting the bug on July 11.
- 35 FortiWeb instances had webshells planted due to this vulnerability, down from 85 earlier.
- Users are advised to update or disable the HTTP/HTTPS interface immediately.
Already a member? Log in here