No advisories yet.
Solution
Upgrade to upcoming FortiDeceptor version 6.3.0 or above Upgrade to FortiDeceptor version 6.1.0 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-138 |
|
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Argument Injection Enabling Log File Retrieval |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests. | |
| First Time appeared |
Fortinet
Fortinet fortideceptor |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:2.3:a:fortinet:fortideceptor:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortideceptor |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-05-12T19:02:21.579Z
Reserved: 2026-02-05T08:56:55.794Z
Link: CVE-2026-25690
Updated: 2026-05-12T19:02:15.982Z
Status : Awaiting Analysis
Published: 2026-05-12T18:16:39.540
Modified: 2026-05-12T18:57:02.307
Link: CVE-2026-25690
No data.
OpenCVE Enrichment
Updated: 2026-05-12T18:30:22Z