Impact
Fortinet FortiSOAR PaaS and on‑premise versions contain a server‑side request forgery (SSRF) flaw (CWE‑918). An authenticated attacker can send crafted requests that cause FortiSOAR to reach internal ports, allowing discovery of services running on the local host. The primary impact is that an attacker gains visibility into the internal network and can use this information for lateral movement or other attacks.
Affected Systems
Affected products include FortiSOAR on‑premise versions 7.3.x through 7.6.4, and FortiSOAR PaaS versions 7.3.x through 7.6.4. All sub‑versions listed in the CNA CPE data are impacted. Both on‑premise and PaaS deployments must be addressed.
Risk and Exploitability
The CVSS score is 4.1, indicating moderate severity. No EPSS data is available and the vulnerability is not listed in the KEV catalog. Exploitation requires valid authentication and crafted requests, so the likelihood is moderate but limited to users with access. The risk is primarily the exposure of internal services, and remediation is advised promptly.
OpenCVE Enrichment