CrowdSec
3/10CrowdSec Score

fogproject - Authentication Bypass (CVE-2025-58443)

Published on06-09-2025
First seen on08-12-2025
Public ExploitCVSS 9.9/10fogproject - fogproject

1Exploiting IPs reported

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.

CrowdSec analysis

CVE-2025-58443 is a critical authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and earlier, allowing unauthenticated attackers to perform a full SQL database dump without credentials. This flaw exposes sensitive data and could be leveraged for data theft, further attacks, or system compromise. Immediate upgrades to the latest development or working branches are recommended to mitigate this severe risk.

CrowdSec has been tracking this vulnerability and its exploits since 19th of November 2025.

Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2025-58443 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2025-58443 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2025-58443 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.

Attackers exploit this vulnerability by sending unauthenticated requests to endpoints such as /fog/management/index.php and /fog/service/getversion.php, bypassing authentication to gain access to the FOGProject management interface and sensitive configuration data.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.