Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to upcoming FortiDeceptor version 6.3.0 or above Upgrade to FortiDeceptor version 6.1.0 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-138 |
|
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Argument Injection Enabling Log File Retrieval |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests. | |
| First Time appeared |
Fortinet
Fortinet fortideceptor |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:2.3:a:fortinet:fortideceptor:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortideceptor |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-05-12T19:02:21.579Z
Reserved: 2026-02-05T08:56:55.794Z
Link: CVE-2026-25690
Updated: 2026-05-12T19:02:15.982Z
Status : Awaiting Analysis
Published: 2026-05-12T18:16:39.540
Modified: 2026-05-12T18:57:02.307
Link: CVE-2026-25690
No data.
OpenCVE Enrichment
Updated: 2026-05-12T18:30:22Z