Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Please upgrade to FortiClientEMS Cloud version 7.4.3 or above Please upgrade to FortiClientEMS version 7.4.3 or above
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14956 | A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited arbitrary file write on the system via upload requests. |
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-552 |
|
Wed, 16 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet forticlientems Fortinet forticlientems Cloud |
|
| CPEs | cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems_cloud:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlientems Fortinet forticlientems Cloud |
Tue, 13 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited arbitrary file write on the system via upload requests. | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-05-13T15:17:40.699Z
Reserved: 2025-01-08T09:38:22.820Z
Link: CVE-2025-22859
Updated: 2025-05-13T15:17:37.804Z
Status : Analyzed
Published: 2025-05-13T15:15:54.293
Modified: 2025-07-16T15:16:59.000
Link: CVE-2025-22859
No data.
OpenCVE Enrichment
No data.
EUVD