{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25088","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2026-01-29T09:27:29.820Z","datePublished":"2026-05-12T16:54:07.352Z","dateUpdated":"2026-05-12T19:02:51.082Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiNDR","cpes":["cpe:2.3:a:fortinet:fortindr:7.6.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.6.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.9:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.6.0","lessThanOrEqual":"7.6.2","status":"affected"},{"versionType":"semver","version":"7.4.0","lessThanOrEqual":"7.4.9","status":"affected"},{"versionType":"semver","version":"7.2.0","lessThanOrEqual":"7.2.5","status":"affected"},{"versionType":"semver","version":"7.1.0","lessThanOrEqual":"7.1.1","status":"affected"},{"versionType":"semver","version":"7.0.0","lessThanOrEqual":"7.0.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiNDR 7.6.0 through 7.6.2, FortiNDR 7.4.0 through 7.4.9, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via  specifically crafted HTTP requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-05-12T16:54:07.352Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-89","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:X"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiNDR version 7.6.3 or above\nUpgrade to FortiNDR version 7.4.10 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-134"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-12T18:59:39.373512Z","id":"CVE-2026-25088","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-12T19:02:51.082Z"}}]}}