An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiProxy 7.6.0 through 7.6.3, 7.4 all versions, 7.2 all versions, 7.0.1 through 7.0.21, and FortiOS 7.6.0 through 7.6.3 explicit web proxy may allow an authenticated proxy user to bypass the domain fronting protection feature via crafted HTTP requests.
                
            References
                    | Link | Resource | 
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-372 | Vendor Advisory | 
Configurations
                    History
                    16 Oct 2025, 14:56
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
| First Time | Fortinet Fortinet fortios Fortinet fortiproxy | |
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-372 - Vendor Advisory | 
15 Oct 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
14 Oct 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-14 16:15
Updated : 2025-10-16 14:56
NVD link : CVE-2025-25255
Mitre link : CVE-2025-25255
CVE.ORG link : CVE-2025-25255
JSON object : View
Products Affected
                fortinet
- fortios
- fortiproxy
CWE
                
                    
                        
                        CWE-358
                        
            Improperly Implemented Security Check for Standard
