
The researcher’s desk: CVE-2025-59287
Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, …
Detectify

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. For this issue, we look at CVE-2025-64446, a critical authentication bypass that has been actively exploited in the wild, targeting Fortinet’s Web Application Firewall (WAF) product, FortiWeb.
| Vulnerability Type | Authentication Bypass / Impersonation Flaw |
| Disclosure Date | November 14, 2025 |
| Score | 9.8 (Critical) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Identifier | CVE-2025-64446 |
| Vulnerable Component | Fortinet FortiWeb (Web Application Firewall) |
| Final Impact | Unauthenticated execution of administrative commands / complete control. |
| Observations | Exploited in the wild; involved a “silent patch.” |
The core issue is a complex Unauthenticated Authentication Bypass flaw. It involves an improper handling mechanism within the FortiWeb appliance that is related to user impersonation functionality.
Essentially, the vulnerability allows an attacker to manipulate the way the system validates user identity, tricking the appliance into granting administrative privileges. The flaw is rooted in how a function intended to handle user context is improperly exposed or protected, enabling its misuse for unauthorized access.
The mechanism involves bypassing the standard login procedure to gain full administrative privileges on the FortiWeb appliance.
This flaw is interesting because it showcases the danger of authentication logic errors and how seemingly internal, administrative functions (like impersonation) can be weaponized when not properly secured. The flaw was exploited in attacks before a public patch was available, confirming its zero-day status.
Questions? We’re happy to hear from you via support@detectify or book a demo to learn more about Detectify.

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, …

This review provides a direct comparison between two external security platforms, Halo Security and Detectify. The analysis will focus on three core areas critical to …