An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiProxy 7.6.0 through 7.6.3, 7.4 all versions, 7.2 all versions, 7.0.1 through 7.0.21, and FortiOS 7.6.0 through 7.6.3 explicit web proxy may allow an authenticated proxy user to bypass the domain fronting protection feature via crafted HTTP requests.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-372 | Vendor Advisory |
Configurations
History
16 Oct 2025, 14:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-372 - Vendor Advisory | |
| First Time |
Fortinet fortiproxy
Fortinet fortios Fortinet |
15 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
14 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-14 16:15
Updated : 2025-10-16 14:56
NVD link : CVE-2025-25255
Mitre link : CVE-2025-25255
CVE.ORG link : CVE-2025-25255
JSON object : View
Products Affected
fortinet
- fortios
- fortiproxy
CWE
CWE-358
Improperly Implemented Security Check for Standard
