VYPR
Unrated severityNVD Advisory· Published Oct 14, 2025· Updated Jan 14, 2026

CVE-2025-25252

CVE-2025-25252

Description

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

Affected products

2
  • Fortinet/Fortiosv52 versions
    cpe:2.3:o:fortinet:fortios:7.6.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:fortinet:fortios:7.6.2:*:*:*:*:*:*:*range: 7.6.0
    • (no CPE)range: >=7.0.0, <=7.0.16; >=7.2.0, <=7.2.10; >=7.4.0, <=7.4.6; >=7.6.0, <=7.6.2; 6.4 all versions

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.