Impact
An improper neutralization of argument delimiters in a command, also known as argument injection, allows an attacker to craft HTTP requests that read log files. The vulnerability exists in Fortinet FortiDeceptor and does not enable privilege escalation; the attacker only requires read‑only admin permission to trigger the data leakage. The outcome is the exposure of internal system logs, potentially revealing sensitive configuration or operational information.
Affected Systems
Fortinet FortiDeceptor is affected in all 5.0.x, 5.1, 5.2.0‑5.2.1, 5.3.0‑5.3.3, 6.0.0‑6.0.2 releases, as listed in the CNA vendor product information. Vulnerable builds include versions 5.0 through 6.0.2 of the product.
Risk and Exploitability
The CVSS score of 4 indicates moderate severity; no EPSS score is available, and the vulnerability is not listed in CISA KEV. The threat is limited to authenticated users with at least read‑only admin rights, which are common in day‑to‑day operations. Exploitation requires sending crafted HTTP requests, a process that can be automated, so the risk remains tangible for organizations that allow external read‑only admins.
OpenCVE Enrichment