Privilege escalation in automation-stitch

Summary

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS and FortiProxy may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

Version Affected Solution
FortiOS 7.6 Not affected Not Applicable
FortiOS 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiOS 7.2 7.2.0 through 7.2.11 Upgrade to 7.2.12 or above
FortiOS 7.0 7.0.6 and above Migrate to a fixed release
FortiOS 6.4 Not affected Not Applicable
FortiProxy 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiProxy 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiProxy 7.2 7.2 all versions Migrate to a fixed release
FortiProxy 7.0 7.0.5 and above Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Francesco Caserta, Alessandro Esposito, Andrea Lomuscio and Alessandro Ruggieri from the Italian National Cybersecurity Agency (ACN) for reporting this vulnerability under responsible disclosure.

Timeline

2025-06-10: Initial publication
2025-09-15: Added FortiOS 7.2.12 solution