CVE Vulnerabilities

CVE-2025-25252

Insufficient Session Expiration

Published: Oct 14, 2025 | Modified: Oct 15, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
FortiosFortinet6.4.0 (including)7.0.17 (excluding)
FortiosFortinet7.2.0 (including)7.2.11 (excluding)
FortiosFortinet7.4.0 (including)7.4.7 (excluding)
FortiosFortinet7.6.0 (including)7.6.3 (excluding)

Potential Mitigations

References