{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:41:58.003","vulnerabilities":[{"cve":{"id":"CVE-2025-53609","sourceIdentifier":"psirt@fortinet.com","published":"2025-09-09T14:15:46.363","lastModified":"2025-09-10T15:14:32.080","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Relative Path Traversal vulnerability [CWE-23] in FortiWeb 7.6.0 through 7.6.4, 7.4.0 through 7.4.8, 7.2.0 through 7.2.11, 7.0.2 through 7.0.11 may allow an authenticated attacker to perform an arbitrary file read on the underlying system via crafted requests."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.2","versionEndExcluding":"7.2.12","matchCriteriaId":"F8D3130A-BFAC-4C36-9F11-C90B919BD744"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.9","matchCriteriaId":"EDB2FF56-D1ED-4EB5-B4D8-8FEDE1A521C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.5","matchCriteriaId":"D358CE92-A30D-4058-8D12-00376E4B9074"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-512","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}