Description
An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters.
Published: 2026-03-10
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting enabling social engineering via forged URL parameters
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper neutralization of input during web page generation that permits an attacker to inject arbitrary script content into a FortiSIEM web page. This cross‑site scripting flaw can be triggered by manipulating URL parameters and is accessed remotely, so an unauthenticated attacker can embed malicious code that runs in the context of any user who visits the forged link. As a result, attackers may compromise user confidentiality, alter data or hijack sessions, and launch phishing or other social engineering campaigns without needing initial access.

Affected Systems

The flaw affects Fortinet FortiSIEM versions 7.4.0 and 7.3.0 through 7.3.4. These product releases expose the vulnerable web interface to external traffic, making them susceptible to exploitation.

Risk and Exploitability

With a CVSS score of 4.1 and an EPSS probability of less than 1 percent, the technical severity is moderate but the exploitability is low due to the requirement of reachability to the web UI and lack of authentication. The vulnerability is not listed in the KEV catalog, suggesting no widespread active exploitation yet. Nonetheless, because the flaw enables classic cross‑site scripting, attackers can leverage social engineering to deliver malicious scripts to users who click forged links.

Generated by OpenCVE AI on April 17, 2026 at 11:42 UTC.

Remediation

Vendor Solution

Upgrade to FortiSIEM version 7.5.0 or above Upgrade to FortiSIEM version 7.4.1 or above Upgrade to FortiSIEM version 7.3.5 or above


OpenCVE Recommended Actions

  • Upgrade FortiSIEM to version 7.5.0 or later
  • Upgrade FortiSIEM to version 7.4.1 or later
  • Upgrade FortiSIEM to version 7.3.5 or later

Generated by OpenCVE AI on April 17, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Title Unrestricted XSS in FortiSIEM Web UI Enables Remote Social Engineering

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters.
First Time appeared Fortinet
Fortinet fortisiem
Weaknesses CWE-79
CPEs cpe:2.3:a:fortinet:fortisiem:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:7.3.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:7.4.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisiem
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C'}


Subscriptions

Fortinet Fortisiem
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-03-12T14:28:02.557Z

Reserved: 2026-02-09T17:14:29.451Z

Link: CVE-2026-25972

cve-icon Vulnrichment

Updated: 2026-03-12T14:27:58.719Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:38.323

Modified: 2026-03-12T16:05:03.403

Link: CVE-2026-25972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses