Metasploit Framework Updated With Exploit for FortiWeb Zero-Day

Metasploit Framework Updated With Exploit for FortiWeb Zero-Day
Metasploit Framework Updated With Exploit for FortiWeb Zero-Day
Rapid7’s Metasploit Framework has officially added a new exploit module targeting Fortinet’s FortiWeb Web Application Firewall (WAF).

This new module is highly critical because it chains together two recently discovered vulnerabilities. When used together, these flaws allow an attacker with no username or password to completely take over a device with “root” (maximum) privileges.

The update was merged into the framework on November 21, 2025, by a contributor sfewer-r7. It provides security researchers and penetration testers with a reliable way to test network defenses against this specific attack chain.

CVE IDTypeImpactSeverity
CVE-2025-64446Auth BypassAllows creation of rogue admin accountsCritical
CVE-2025-58034Command InjectionAllows root-level code executionHigh

The Exploit Chain Explained

The new Metasploit module exploits two distinct security flaws. By themselves, they are dangerous, but together they offer a “golden ticket” for attackers.

  1. The Entry Point (CVE-2025-64446): This is an authentication bypass vulnerability. It allows an outside attacker to force the system to create a new administrator account without needing permission. In the Metasploit logs, the tool automatically generates a random username (e.g., isela_fritsch) and a password to register itself as a valid admin.
  2. The Execution (CVE-2025-58034): Once the attacker has the admin account from the first step, they use this second vulnerability. It is an “Operating System Command Injection” flaw. It allows the logged-in admin to run deep system commands that are usually restricted.

The module automates this entire process: it creates a fake admin account, logs in, and immediately runs a command injection to open a reverse shell, as reported by Rapid7 on GitHub.

During the development of this module, researchers hit a roadblock involving the FortiWeb operating system kernel. The developer noted that standard “Fetch” payloads failed to work

Usually, an exploit drops a small file into a temporary folder (like /tmp) and makes it executable using the chmod +x command.

However, the FortiWeb kernel actively blocks this action, showing a “Permission denied” error even to the root user.

To get around this, the Metasploit module avoids dropping binary files. Instead, it uses “Command” payloads scripts written in Bash, Python, or OpenSSL.

These scripts can run directly in the device’s memory without needing special file permissions, bypassing the kernel’s defense mechanisms.

Network defenders should look for unusual account creation logs or unexpected administrative logins. The exploit typically creates a new admin user, performs a task, and then may attempt to hide its tracks.

Security teams should ensure their FortiWeb appliances are updated to the latest firmware version that immediately patches both CVEs.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post Metasploit Framework Updated With Exploit for FortiWeb Zero-Day appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading