fogproject - Authentication Bypass (CVE-2025-58443)
1Exploiting IPs reported
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.
CrowdSec analysis
CVE-2025-58443 is a critical authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and earlier, allowing unauthenticated attackers to perform a full SQL database dump without credentials. This flaw exposes sensitive data and could be leveraged for data theft, further attacks, or system compromise. Immediate upgrades to the latest development or working branches are recommended to mitigate this severe risk.
CrowdSec has been tracking this vulnerability and its exploits since 19th of November 2025.
Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2025-58443 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2025-58443 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2025-58443 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.
Attackers exploit this vulnerability by sending unauthenticated requests to endpoints such as /fog/management/index.php and /fog/service/getversion.php, bypassing authentication to gain access to the FOGProject management interface and sensitive configuration data.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.