CVE-2025-58443

CRITICAL EXPLOITED NUCLEI

FOG <1.5.10.1673 - Auth Bypass

Title source: llm

Description

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.

Exploits (1)

nomisec WORKING POC 2 stars
by casp3r0x0 · remote
https://github.com/casp3r0x0/CVE-2025-58443

Nuclei Templates (1)

FOGProject <= 1.5.10.1673 - Authentication Bypass
CRITICALby oleveloper
Shodan: http.favicon.hash:-1952619005
FOFA: icon_hash="-1952619005"

Scores

CVSS v3 9.1
EPSS 0.1168
EPSS Percentile 93.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

VulnCheck KEV 2025-12-08
CWE
CWE-287 CWE-306
Status published
Products (1)
fogproject/fogproject < 1.5.10.1673
Published Sep 06, 2025
Tracked Since Feb 18, 2026