Security Report - FortiWeb Unauthenticated RCE via Path Traversal and CGI Auth Bypass CVE-2025-64446
Fortinet assigned FG-IR-25-910 / CVE-2025-64446 to this issue on 14 Nov 2025, rating it Critical (CVSS 9.1) and confirming exploitation in the wild. The official advisory describes it as a “path confusion” (relative path traversal) in the FortiWeb GUI that lets an unauthenticated attacker execute administrative commands via crafted HTTP(S) requests. The mechanics match our findings: a traversal under /api/v2.0/… reaches /migadmin/cgi-bin/fwbcgi, and cgi_auth() blindly trusts the attacker-supplied HTTP_CGIINFO header to impersonate any administrator.
- Path traversal in Apache routing –
httpd.confregisters<Location /api/v2.0/> SetHandler fwbcgi-handler. Apache matches the prefix before decoding%3for collapsing/../, so/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgiis forwarded straight to fwbcgi. - **
cgi_auth()trusts client-supplie