{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T01:17:09.255","vulnerabilities":[{"cve":{"id":"CVE-2026-25689","sourceIdentifier":"psirt@fortinet.com","published":"2026-03-10T18:18:37.893","lastModified":"2026-03-13T19:08:47.447","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.2.0, FortiDeceptor 6.0 all versions, FortiDeceptor 5.3 all versions, FortiDeceptor 5.2 all versions, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions, FortiDeceptor 4.3 all versions, FortiDeceptor 4.2 all versions, FortiDeceptor 4.1 all versions, FortiDeceptor 4.0 all versions may allow a privileged attacker with super-admin profile and CLI access to delete sensitive files via crafted HTTP requests."},{"lang":"es","value":"Una neutralización incorrecta de delimitadores de argumentos en un comando ('inyección de argumentos') vulnerabilidad en Fortinet FortiDeceptor 6.2.0, FortiDeceptor 6.0 todas las versiones, FortiDeceptor 5.3 todas las versiones, FortiDeceptor 5.2 todas las versiones, FortiDeceptor 5.1 todas las versiones, FortiDeceptor 5.0 todas las versiones, FortiDeceptor 4.3 todas las versiones, FortiDeceptor 4.2 todas las versiones, FortiDeceptor 4.1 todas las versiones, FortiDeceptor 4.0 todas las versiones puede permitir a un atacante privilegiado con perfil de superadministrador y acceso CLI eliminar archivos sensibles a través de solicitudes HTTP manipuladas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Primary","description":[{"lang":"en","value":"CWE-88"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"6.0.3","matchCriteriaId":"8C4C32A5-DB90-425A-8036-07C22BD41135"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortideceptor:6.2.0:*:*:*:*:*:*:*","matchCriteriaId":"B068BDA7-5FA0-48AF-9AD1-6E5DCBBBDA66"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-094","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}