Privilege escalation in automation-stitch
Summary
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS and FortiProxy may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | Not affected | Not Applicable |
| FortiOS 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.11 | Upgrade to 7.2.12 or above |
| FortiOS 7.0 | 7.0.6 and above | Migrate to a fixed release |
| FortiOS 6.4 | Not affected | Not Applicable |
| FortiProxy 7.6 | 7.6.0 through 7.6.2 | Upgrade to 7.6.3 or above |
| FortiProxy 7.4 | 7.4.0 through 7.4.8 | Upgrade to 7.4.9 or above |
| FortiProxy 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiProxy 7.0 | 7.0.5 and above | Migrate to a fixed release |
Acknowledgement
Fortinet is pleased to thank Francesco Caserta, Alessandro Esposito, Andrea Lomuscio and Alessandro Ruggieri from the Italian National Cybersecurity Agency (ACN) for reporting this vulnerability under responsible disclosure.Timeline
2025-06-10: Initial publication2025-09-15: Added FortiOS 7.2.12 solution