{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25690","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2026-02-05T08:56:55.794Z","datePublished":"2026-05-12T16:54:10.546Z","dateUpdated":"2026-05-12T19:02:21.579Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiDeceptor","cpes":["cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:6.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:6.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.3.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortideceptor:5.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"6.0.0","lessThanOrEqual":"6.0.2","status":"affected"},{"versionType":"semver","version":"5.3.0","lessThanOrEqual":"5.3.3","status":"affected"},{"versionType":"semver","version":"5.2.0","lessThanOrEqual":"5.2.1","status":"affected"},{"version":"5.1.0","status":"affected"},{"version":"5.0.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-05-12T16:54:10.546Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-88","description":"Information disclosure","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C"}}],"solutions":[{"lang":"en","value":"Upgrade to upcoming  FortiDeceptor version 6.3.0 or above\nUpgrade to FortiDeceptor version 6.1.0 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-138"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-12T19:00:14.405140Z","id":"CVE-2026-25690","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-12T19:02:21.579Z"}}]}}