Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to FortiVoice version 7.2.3 or above Upgrade to FortiVoice version 7.0.8 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-778 |
|
Wed, 14 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* |
Tue, 13 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests. | |
| First Time appeared |
Fortinet
Fortinet fortivoice |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.2.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortivoice |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-01-14T09:16:23.320Z
Reserved: 2025-09-03T11:48:42.097Z
Link: CVE-2025-58693
Updated: 2026-01-13T21:40:10.871Z
Status : Analyzed
Published: 2026-01-13T17:15:57.940
Modified: 2026-01-14T21:34:22.663
Link: CVE-2025-58693
No data.
OpenCVE Enrichment
No data.