CVE-2025-25252

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

15 Oct 2025, 17:33

Type Values Removed Values Added
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-487 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-487 - Vendor Advisory
CPE cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
First Time Fortinet fortios
Fortinet

14 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-14 16:15

Updated : 2025-10-15 17:33


NVD link : CVE-2025-25252

Mitre link : CVE-2025-25252

CVE.ORG link : CVE-2025-25252


JSON object : View

Products Affected

fortinet

  • fortios
CWE
CWE-613

Insufficient Session Expiration