Description
An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests.
Published: 2026-05-12
Score: 4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improper neutralization of argument delimiters in a command, also known as argument injection, allows an attacker to craft HTTP requests that read log files. The vulnerability exists in Fortinet FortiDeceptor and does not enable privilege escalation; the attacker only requires read‑only admin permission to trigger the data leakage. The outcome is the exposure of internal system logs, potentially revealing sensitive configuration or operational information.

Affected Systems

Fortinet FortiDeceptor is affected in all 5.0.x, 5.1, 5.2.0‑5.2.1, 5.3.0‑5.3.3, 6.0.0‑6.0.2 releases, as listed in the CNA vendor product information. Vulnerable builds include versions 5.0 through 6.0.2 of the product.

Risk and Exploitability

The CVSS score of 4 indicates moderate severity; no EPSS score is available, and the vulnerability is not listed in CISA KEV. The threat is limited to authenticated users with at least read‑only admin rights, which are common in day‑to‑day operations. Exploitation requires sending crafted HTTP requests, a process that can be automated, so the risk remains tangible for organizations that allow external read‑only admins.

Generated by OpenCVE AI on May 12, 2026 at 18:22 UTC.

Remediation

Vendor Solution

Upgrade to upcoming FortiDeceptor version 6.3.0 or above Upgrade to FortiDeceptor version 6.1.0 or above


OpenCVE Recommended Actions

  • Upgrade FortiDeceptor to version 6.3.0 or later
  • Upgrade FortiDeceptor to version 6.1.0 or later
  • Restrict read‑only admin accounts and enforce the principle of least privilege to limit access to log files

Generated by OpenCVE AI on May 12, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Command Argument Injection Enabling Log File Retrieval

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests.
First Time appeared Fortinet
Fortinet fortideceptor
Weaknesses CWE-88
CPEs cpe:2.3:a:fortinet:fortideceptor:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortideceptor
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C'}


Subscriptions

Fortinet Fortideceptor
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-05-12T19:02:21.579Z

Reserved: 2026-02-05T08:56:55.794Z

Link: CVE-2026-25690

cve-icon Vulnrichment

Updated: 2026-05-12T19:02:15.982Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T18:16:39.540

Modified: 2026-05-12T18:57:02.307

Link: CVE-2026-25690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:30:22Z

Weaknesses