


Perceptive Security
SOC/SIEM Consultancy

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability…
Published:
22 januari 2026 om 23:00:00
Alert date:
23 januari 2026 om 02:00:55
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
FOG Project, an open-source cloning/imaging/rescue suite and inventory management system, contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in versions 1.5.10.1754 and below. The vulnerability exists in getversion.php and can be triggered through a user-controlled URL parameter. Attackers can exploit this to fetch internal websites and files on the machine running FOG. The vulnerability is accessible without authentication when the request includes newService=1. No fixed release version is available at the time of publication, making this a critical security concern for organizations using affected FOG versions.
Technical details
Mitigation steps:
Affected products:
FOG Project
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-24138
https://github.com/FOGProject/fogproject/security/advisories/GHSA-79xw-c2qx-g7xj
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
