CVE-2025-52970 FortiWeb Broken Access Control Template

This PR adds a complete Nuclei template for CVE-2025-52970 (FortiWeb Broken Access Control vulnerability).

Vulnerability Details

  • CVE: CVE-2025-52970
  • Type: Broken Access Control
  • Severity: High (CVSS 9.8)
  • Affected Versions: FortiWeb <= 7.6.3, <= 7.4.7, <= 7.2.10, and <= 7.0.10

Template Features

  • ✅ Complete POC implementation (not version-based detection)
  • ✅ Tests actual vulnerability behavior via crafted internal IP headers
  • ✅ Multiple internal IP header variations for comprehensive coverage
  • ✅ Strong matchers to prevent false positives
  • ✅ Comprehensive debug output included
  • ✅ Vulnerable instance setup documentation provided

Files Added

  • http/cves/2025/CVE-2025-52970.yaml - Main template
  • VULNERABLE_FORTIWEB_SETUP.md - Setup documentation
  • test-fortiweb-vulnerability.sh - Test script
  • mock-vulnerable-fortiweb.py - Mock server for testing
  • CVE-2025-52970-template-submission.md - Comprehensive documentation

Testing

  • Template syntax validated with `nuclei -validate`
  • Debug output generated with `nuclei -debug`
  • Tested against mock vulnerable environment
  • Meets all Community Rewards FAQ requirements

References

/claim #13123

Claim

Total prize pool $100
Total paid $0
Status Pending
Submitted September 09, 2025
Last updated September 09, 2025

Contributors

BR

Bryan Wills

@bryanwills

100%

Sponsors

PR

ProjectDiscovery

@projectdiscovery

$100