Home

Description

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.

PUBLISHED Reserved 2025-09-01 | Published 2025-09-06 | Updated 2025-09-08 | Assigner GitHub_M




CRITICAL: 9.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Problem types

CWE-306: Missing Authentication for Critical Function

CWE-287: Improper Authentication

Product status

<= 1.5.10.1673
affected

References

github.com/...roject/security/advisories/GHSA-mvwm-9m2h-87p9

cve.org (CVE-2025-58443)

nvd.nist.gov (CVE-2025-58443)

Download JSON