{"api_version":"1","generated_at":"2026-05-13T20:24:50+00:00","cve":"CVE-2026-25690","urls":{"html":"https://cve.report/CVE-2026-25690","api":"https://cve.report/api/cve/CVE-2026-25690.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-25690","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-25690"},"summary":{"title":"CVE-2026-25690","description":"An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests.","state":"PUBLISHED","assigner":"fortinet","published_at":"2026-05-12 18:16:39","updated_at":"2026-05-12 18:57:02"},"problem_types":["CWE-88","CWE-88 Information disclosure"],"metrics":[{"version":"3.1","source":"psirt@fortinet.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138","name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138","refsource":"psirt@fortinet.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-25690","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25690","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"FortiDeceptor","version":"affected 6.0.0 6.0.2 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiDeceptor","version":"affected 5.3.0 5.3.3 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiDeceptor","version":"affected 5.2.0 5.2.1 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiDeceptor","version":"affected 5.1.0","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiDeceptor","version":"affected 5.0.0","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to upcoming  FortiDeceptor version 6.3.0 or above\nUpgrade to FortiDeceptor version 6.1.0 or above","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"cpes":["cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:6.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:6.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiDeceptor","vendor":"Fortinet","versions":[{"lessThanOrEqual":"6.0.2","status":"affected","version":"6.0.0","versionType":"semver"},{"lessThanOrEqual":"5.3.3","status":"affected","version":"5.3.0","versionType":"semver"},{"lessThanOrEqual":"5.2.1","status":"affected","version":"5.2.0","versionType":"semver"},{"status":"affected","version":"5.1.0"},{"status":"affected","version":"5.0.0"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-88","description":"Information disclosure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T16:54:10.546Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138"}],"solutions":[{"lang":"en","value":"Upgrade to upcoming  FortiDeceptor version 6.3.0 or above\nUpgrade to FortiDeceptor version 6.1.0 or above"}]}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2026-25690","datePublished":"2026-05-12T16:54:10.546Z","dateReserved":"2026-02-05T08:56:55.794Z","dateUpdated":"2026-05-12T16:54:10.546Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 18:16:39","lastModifiedDate":"2026-05-12 18:57:02","problem_types":["CWE-88","CWE-88 Information disclosure"],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"25690","Ordinal":"1","Title":"CVE-2026-25690","CVE":"CVE-2026-25690","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"25690","Ordinal":"1","NoteData":"An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests.","Type":"Description","Title":"CVE-2026-25690"}]}}}