No analysis available yet.
Vendor Solution
Upgrade to FortiSIEM version 7.5.0 or above Upgrade to FortiSIEM version 7.4.1 or above Upgrade to FortiSIEM version 7.3.5 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-077 |
|
Thu, 12 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters. | |
| First Time appeared |
Fortinet
Fortinet fortisiem |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:fortinet:fortisiem:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.4.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortisiem |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-03-12T14:28:02.557Z
Reserved: 2026-02-09T17:14:29.451Z
Link: CVE-2026-25972
Updated: 2026-03-12T14:27:58.719Z
Status : Analyzed
Published: 2026-03-10T18:18:38.323
Modified: 2026-03-12T16:05:03.403
Link: CVE-2026-25972
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:49:16Z