Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24457 | An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions WEB UI may allow an authenticated remote attacker to perform an XSS attack via stored malicious service requests |
Solution
Please upgrade to FortiSOAR version 7.6.2 or above Please upgrade to FortiSOAR version 7.5.2 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-513 |
|
Fri, 15 Aug 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:* |
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions WEB UI may allow an authenticated remote attacker to perform an XSS attack via stored malicious service requests | |
| First Time appeared |
Fortinet
Fortinet fortisoar |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:fortinet:fortisoar:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.6.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortisoar |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-08-13T20:13:36.224Z
Reserved: 2025-04-14T20:15:17.185Z
Link: CVE-2025-32932
Updated: 2025-08-13T19:54:24.538Z
Status : Analyzed
Published: 2025-08-12T19:15:29.260
Modified: 2025-08-15T12:25:28.417
Link: CVE-2025-32932
No data.
OpenCVE Enrichment
No data.
EUVD