CVE Vulnerabilities

CVE-2025-25252

Insufficient Session Expiration

Published: Oct 14, 2025 | Modified: Oct 15, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Fortios Fortinet 6.4.0 (including) 7.0.17 (excluding)
Fortios Fortinet 7.2.0 (including) 7.2.11 (excluding)
Fortios Fortinet 7.4.0 (including) 7.4.7 (excluding)
Fortios Fortinet 7.6.0 (including) 7.6.3 (excluding)

Potential Mitigations

References