fogproject - Authentication Bypass (CVE-2025-58443)
1Exploiting IPs reported
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CrowdSec analysis
CVE-2025-58443 is a critical authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and earlier, allowing unauthenticated attackers to perform a full SQL database dump without credentials. This flaw exposes sensitive data and could be leveraged for data theft, further attacks, or system compromise. Immediate upgrades to the latest development or working branches are recommended to mitigate this severe risk.
CrowdSec has been tracking this vulnerability and its exploits since 19th of November 2025.
CrowdSec network data shows that most actors exploiting CVE-2025-58443 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-58443 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.
Attackers exploit this vulnerability by sending unauthenticated requests to endpoints such as /fog/management/index.php and /fog/service/getversion.php, bypassing authentication to gain access to the FOGProject management interface and sensitive configuration data.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.