CVE-2025-58443
CRITICAL EXPLOITED NUCLEIFOG <1.5.10.1673 - Auth Bypass
Title source: llmDescription
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
Exploits (1)
Nuclei Templates (1)
FOGProject <= 1.5.10.1673 - Authentication Bypass
CRITICALby oleveloper
Shodan:
http.favicon.hash:-1952619005
FOFA:
icon_hash="-1952619005"
Scores
CVSS v3
9.1
EPSS
0.1168
EPSS Percentile
93.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
VulnCheck KEV
2025-12-08
CWE
CWE-287
CWE-306
Status
published
Products (1)
fogproject/fogproject
< 1.5.10.1673
Published
Sep 06, 2025
Tracked Since
Feb 18, 2026