{"api_version":"1","generated_at":"2026-04-17T08:25:32+00:00","cve":"CVE-2026-21643","urls":{"html":"https://cve.report/CVE-2026-21643","api":"https://cve.report/api/cve/CVE-2026-21643.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-21643","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643"},"summary":{"title":"CVE-2026-21643","description":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.","state":"PUBLISHED","assigner":"fortinet","published_at":"2026-02-06 09:15:49","updated_at":"2026-04-14 14:21:18"},"problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":[{"version":"3.1","source":"psirt@fortinet.com","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py","name":"https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142","name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142","refsource":"psirt@fortinet.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-21643","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21643","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"FortiClientEMS","version":"affected 7.4.4","platforms":[]}],"timeline":[{"source":"ADP","time":"2026-04-13T00:00:00.000Z","lang":"en","value":"CVE-2026-21643 added to CISA KEV"}],"solutions":[{"source":"CNA","title":"","value":"Upgrade to upcoming  FortiClientEMS version 8.0.0 or above\nUpgrade to FortiClientEMS version 7.4.5 or above","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"21643","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"forticlientems","cpe6":"7.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2026","cve_id":"21643","cve":"CVE-2026-21643","vendorProject":"Fortinet","product":"FortiClient EMS","vulnerabilityName":"Fortinet FortiClient EMS SQL Injection Vulnerability","dateAdded":"2026-04-13","shortDescription":"Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-04-16","knownRansomwareCampaignUse":"Unknown","notes":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21643","cwes":"CWE-89","catalogVersion":"2026.04.16","updated_at":"2026-04-16 13:54:08"},"epss":{"cve_year":"2026","cve_id":"21643","cve":"CVE-2026-21643","epss":"0.339070000","percentile":"0.969670000","score_date":"2026-04-16","updated_at":"2026-04-17 00:09:24"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-21643","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-02-06T00:00:00+00:00","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2026-04-13","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643"},"type":"kev"}}],"providerMetadata":{"dateUpdated":"2026-04-14T03:55:26.806Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py"},{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643"}],"timeline":[{"lang":"en","time":"2026-04-13T00:00:00.000Z","value":"CVE-2026-21643 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:fortinet:forticlientems:7.4.4:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiClientEMS","vendor":"Fortinet","versions":[{"status":"affected","version":"7.4.4"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"Execute unauthorized code or commands","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-31T17:06:20.893Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-1142"}],"solutions":[{"lang":"en","value":"Upgrade to upcoming  FortiClientEMS version 8.0.0 or above\nUpgrade to FortiClientEMS version 7.4.5 or above"}]}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2026-21643","datePublished":"2026-02-06T08:24:43.877Z","dateReserved":"2026-01-02T08:41:26.514Z","dateUpdated":"2026-04-14T03:55:26.806Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-02-06 09:15:49","lastModifiedDate":"2026-04-14 14:21:18","problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlientems:7.4.4:*:*:*:*:*:*:*","matchCriteriaId":"552AF7AC-8630-442C-A7A4-66CA789DC3FD"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"21643","Ordinal":"1","Title":"CVE-2026-21643","CVE":"CVE-2026-21643","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"21643","Ordinal":"1","NoteData":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.","Type":"Description","Title":"CVE-2026-21643"}]}}}