{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-26087","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2021-01-25T14:47:15.090Z","datePublished":"2025-03-17T13:05:19.849Z","dateUpdated":"2025-03-17T13:52:53.619Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiWLC","cpes":["cpe:2.3:a:fortinet:fortiwlc:8.6.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"8.6.0","status":"affected"},{"versionType":"semver","version":"8.5.0","lessThanOrEqual":"8.5.3","status":"affected"},{"versionType":"semver","version":"8.4.4","lessThanOrEqual":"8.4.8","status":"affected"},{"versionType":"semver","version":"8.4.0","lessThanOrEqual":"8.4.2","status":"affected"},{"version":"8.3.3","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 web interface may allow both authenticated remote attackers and non-authenticated attackers in the same network as the appliance to perform a stored cross site scripting attack (XSS) via injecting malicious payloads in different locations."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2025-03-17T13:05:19.849Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:X"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiWLC version 8.6.1 or above. Please upgrade to FortiWLC version 8.5.4 or above."}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-20-137","url":"https://fortiguard.fortinet.com/psirt/FG-IR-20-137"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-17T13:52:44.840845Z","id":"CVE-2021-26087","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T13:52:53.619Z"}}]}}