XSS in default error page

Summary

An Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability [CWE-80] in FortiADC virtual server's default error page may allow an unauthenticated attacker to execute malicious code via crafted URL.

Version Affected Solution
FortiADC 8.0 8.0.0 Upgrade to 8.0.1 or above
FortiADC 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiADC 7.4 7.4 all versions Migrate to a fixed release
FortiADC 7.2 7.2 all versions Migrate to a fixed release
FortiADC 7.1 Not affected Not Applicable
FortiADC 7.0 Not affected Not Applicable
FortiADC 6.2 Not affected Not Applicable

Workarounds:
Do not use "waf_deny.html" error page or customise it to either remove the"error-info" class or to change it into a standard hardcoded message.

Acknowledgement

Fortinet is pleased to thank ShenkerGroup and Italian ACN (National Authority Cybersecurity) for reporting this vulnerability under responsible disclosure.

Timeline

2025-11-18: Initial publication