{"api_version":"1","generated_at":"2026-04-23T05:58:29+00:00","cve":"CVE-2026-39809","urls":{"html":"https://cve.report/CVE-2026-39809","api":"https://cve.report/api/cve/CVE-2026-39809.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-39809","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-39809"},"summary":{"title":"CVE-2026-39809","description":"A improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.0 through 7.4.5, FortiClientEMS 7.2.0 through 7.2.12, FortiClientEMS 7.0 all versions may allow attacker to execute unauthorized code or commands via sending crafted requests","state":"PUBLISHED","assigner":"fortinet","published_at":"2026-04-14 16:16:45","updated_at":"2026-04-21 17:02:54"},"problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":[{"version":"3.1","source":"psirt@fortinet.com","type":"Secondary","score":"6.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"6.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.2,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-102","name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-102","refsource":"psirt@fortinet.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-39809","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39809","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"FortiClientEMS","version":"affected 7.4.3 7.4.4 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiClientEMS","version":"affected 7.4.0 7.4.1 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to FortiClientEMS version 7.4.6 or above\nUpgrade to FortiClientEMS version 7.4.5 or above\nUpgrade to FortiClientEMS version 7.2.13 or above","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"39809","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"forticlientems","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"39809","vulnerable":"1","versionEndIncluding":"7.0.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"forticlientems","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"39809","cve":"CVE-2026-39809","epss":"0.000270000","percentile":"0.077770000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-39809","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-14T00:00:00+00:00","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-15T03:58:18.867Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:fortinet:forticlientems:7.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientems:7.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientems:7.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:forticlientems:7.4.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiClientEMS","vendor":"Fortinet","versions":[{"lessThanOrEqual":"7.4.4","status":"affected","version":"7.4.3","versionType":"semver"},{"lessThanOrEqual":"7.4.1","status":"affected","version":"7.4.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"A improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.0 through 7.4.5, FortiClientEMS 7.2.0 through 7.2.12, FortiClientEMS 7.0 all versions may allow attacker to execute unauthorized code or commands via sending crafted requests"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.2,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"Execute unauthorized code or commands","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T17:38:34.503Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-102","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-102"}],"solutions":[{"lang":"en","value":"Upgrade to FortiClientEMS version 7.4.6 or above\nUpgrade to FortiClientEMS version 7.4.5 or above\nUpgrade to FortiClientEMS version 7.2.13 or above"}]}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2026-39809","datePublished":"2026-04-14T15:05:56.647Z","dateReserved":"2026-04-07T15:24:05.925Z","dateUpdated":"2026-04-15T03:58:18.867Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 16:16:45","lastModifiedDate":"2026-04-21 17:02:54","problem_types":["CWE-89","CWE-89 Execute unauthorized code or commands"],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"7.0.13","matchCriteriaId":"91D4223F-37D4-45D7-A767-2AA8EDAC9AEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0","versionEndExcluding":"7.2.13","matchCriteriaId":"6829FECD-54D2-42D1-B2F8-B34B3913FC51"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.6","matchCriteriaId":"7FF067FF-526C-4399-8220-E2978445F005"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"39809","Ordinal":"1","Title":"CVE-2026-39809","CVE":"CVE-2026-39809","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"39809","Ordinal":"1","NoteData":"A improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.0 through 7.4.5, FortiClientEMS 7.2.0 through 7.2.12, FortiClientEMS 7.0 all versions may allow attacker to execute unauthorized code or commands via sending crafted requests","Type":"Description","Title":"CVE-2026-39809"}]}}}