CVE-2025-25252
📊 4.8 MEDIUM⚡ 0.1%🎯 0 exploits
📅 Published Oct 14, 2025
📋 Status: Analyzed
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
4 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
💻OS | fortinet | fortios | ≥ 6.4.0 ∧ < 7.0.17 | Vulnerable | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
💻OS | fortinet | fortios | ≥ 7.2.0 ∧ < 7.2.11 | Vulnerable | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
💻OS | fortinet | fortios | ≥ 7.4.0 ∧ < 7.4.7 | Vulnerable | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
💻OS | fortinet | fortios | ≥ 7.6.0 ∧ < 7.6.3 | Vulnerable | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
Version: ≥ 6.4.0 ∧ < 7.0.17
CPE:
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Version: ≥ 7.2.0 ∧ < 7.2.11
CPE:
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Version: ≥ 7.4.0 ∧ < 7.4.7
CPE:
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector:
NETWORK
Complexity:
HIGH
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
LOW
Integrity:
LOW
Availability:
NONE
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
4.8 (MEDIUM)v3.1
Source: [email protected]
EPSS Details
0.1% (Minimal)15.8th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Oct 14, 2025 (19 days ago)
Last Modified
Oct 15, 2025 (18 days ago)
Security Weaknesses1
CWE-613
References2
NVDgeneral