{"api_version":"1","generated_at":"2026-05-13T18:03:34+00:00","cve":"CVE-2026-25088","urls":{"html":"https://cve.report/CVE-2026-25088","api":"https://cve.report/api/cve/CVE-2026-25088.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-25088","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-25088"},"summary":{"title":"CVE-2026-25088","description":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiNDR 7.6.0 through 7.6.2, FortiNDR 7.4.0 through 7.4.9, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via  specifically crafted HTTP requests.","state":"PUBLISHED","assigner":"fortinet","published_at":"2026-05-12 18:16:39","updated_at":"2026-05-12 18:57:02"},"problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":[{"version":"3.1","source":"psirt@fortinet.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:X","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:X","version":"3.1"}}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134","name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134","refsource":"psirt@fortinet.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-25088","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25088","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.6.0 7.6.2 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.4.0 7.4.9 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.2.0 7.2.5 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.1.0 7.1.1 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.0.0 7.0.7 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to FortiNDR version 7.6.3 or above\nUpgrade to FortiNDR version 7.4.10 or above","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:fortinet:fortindr:7.6.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.6.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.9:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiNDR","vendor":"Fortinet","versions":[{"lessThanOrEqual":"7.6.2","status":"affected","version":"7.6.0","versionType":"semver"},{"lessThanOrEqual":"7.4.9","status":"affected","version":"7.4.0","versionType":"semver"},{"lessThanOrEqual":"7.2.5","status":"affected","version":"7.2.0","versionType":"semver"},{"lessThanOrEqual":"7.1.1","status":"affected","version":"7.1.0","versionType":"semver"},{"lessThanOrEqual":"7.0.7","status":"affected","version":"7.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiNDR 7.6.0 through 7.6.2, FortiNDR 7.4.0 through 7.4.9, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via  specifically crafted HTTP requests."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:X","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"Execute unauthorized code or commands","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T16:54:07.352Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134"}],"solutions":[{"lang":"en","value":"Upgrade to FortiNDR version 7.6.3 or above\nUpgrade to FortiNDR version 7.4.10 or above"}]}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2026-25088","datePublished":"2026-05-12T16:54:07.352Z","dateReserved":"2026-01-29T09:27:29.820Z","dateUpdated":"2026-05-12T16:54:07.352Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 18:16:39","lastModifiedDate":"2026-05-12 18:57:02","problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"25088","Ordinal":"1","Title":"CVE-2026-25088","CVE":"CVE-2026-25088","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"25088","Ordinal":"1","NoteData":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiNDR 7.6.0 through 7.6.2, FortiNDR 7.4.0 through 7.4.9, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via  specifically crafted HTTP requests.","Type":"Description","Title":"CVE-2026-25088"}]}}}