CVE-2025-53951

📊 5.3 MEDIUM0.0%🎯 0 exploits
📅 Published Oct 16, 2025
📋 Status: Analyzed

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port.

🎯 Affected Products & Systems

2 product configurations affected

Filter by type:
📱
Vulnerable
Version: ≥ 10.3.1 ∧ ≤ 11.5.1
CPE:
cpe:2.3:a:fortinet:fortidlp_agent:*:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Metrics
5.3 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
LOW
User Interaction:
NONE
Confidentiality:
LOW
Integrity:
LOW
Availability:
LOW
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
5.3 (MEDIUM)v3.1
EPSS Details
0.0% (Minimal)3.3th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Oct 16, 2025 (15 days ago)
Last Modified
Oct 16, 2025 (15 days ago)
Security Weaknesses1
References2