Description
A cleartext transmission of sensitive information vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured
Published: 2026-04-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cleartext Password Exposure
Action: Apply Patch
AI Analysis

Impact

A vulnerability identified as CWE-319 allows an authenticated attacker to receive sensitive information, specifically cleartext passwords, in the response to Secure Message Exchange and Radius queries. In Fortinet FortiSOAR PaaS and on-premise deployments, when these features are enabled, credentials are transmitted in plaintext over the network. The attacker gains compromise of user credentials, potentially enabling credential reuse or compromise of other services.

Affected Systems

Clients of Fortinet FortiSOAR PaaS, versions up to 7.6.3 and 7.5.2, and all 7.4 and 7.3 releases, are affected. On‑premise installations from version 7.6.2 down to 7.3 are also vulnerable. The issue is present regardless of the deployment model and applies to all Fortinet FortiSOAR versions listed in the advisory.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium impact, and since the vulnerability requires an authenticated session, the likelihood of exploitation is contingent on an attacker’s access to FortiSOAR administrative functions. Although an EPSS score is not available and the vulnerability is not in the CISA KEV catalog, an attacker who gains legitimate credentials can easily capture cleartext passwords during normal network traffic. Therefore, the risk is moderate but potentially significant to confidentiality.

Generated by OpenCVE AI on April 14, 2026 at 17:43 UTC.

Remediation

Vendor Solution

Upgrade to FortiSOAR PaaS version 7.6.4 or above Upgrade to upcoming FortiSOAR PaaS version 7.5.3 or above Upgrade to FortiSOAR on-premise version 7.6.4 or above Upgrade to FortiSOAR on-premise version 7.6.3 or above Upgrade to upcoming FortiSOAR on-premise version 7.5.3 or above Upgrade to FortiSOAR on-premise version 7.5.2 or above


OpenCVE Recommended Actions

  • Upgrade FortiSOAR PaaS to version 7.6.4 or above
  • Upgrade FortiSOAR PaaS to upcoming 7.5.3 or above
  • Upgrade FortiSOAR on-premise to version 7.6.4 or above
  • Upgrade FortiSOAR on-premise to version 7.6.3 or above
  • Upgrade FortiSOAR on-premise to upcoming 7.5.3 or above
  • Upgrade FortiSOAR on-premise to 7.5.2 or above

Generated by OpenCVE AI on April 14, 2026 at 17:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Cleartext Password Exposure in FortiSOAR Secure Message Exchange and Radius Queries

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description A cleartext transmission of sensitive information vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured
First Time appeared Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
Weaknesses CWE-319
CPEs cpe:2.3:a:fortinet:fortisoaron-premise:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C'}


Subscriptions

Fortinet Fortisoaron-premise Fortisoarpaas
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-14T16:46:16.652Z

Reserved: 2026-01-05T14:17:53.224Z

Link: CVE-2026-21742

cve-icon Vulnrichment

Updated: 2026-04-14T16:37:26.814Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:35.930

Modified: 2026-04-14T16:16:35.930

Link: CVE-2026-21742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses