PT-2026-2479 · Fortinet · Forticlientems
Published
2026-01-13
·
Updated
2026-02-06
·
CVE-2025-59922
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiClientEMS versions 7.0 through 7.4.4
Fortinet FortiClientEMS versions 7.2.0 through 7.2.10
Fortinet FortiClientEMS versions 7.4.0 through 7.4.1
Fortinet FortiClientEMS versions 7.4.3 through 7.4.4
Description
An improper neutralization of special elements used in an SQL command vulnerability exists. This issue may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.
Recommendations
Fortinet FortiClientEMS versions 7.0 through 7.4.4: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Fortinet FortiClientEMS versions 7.2.0 through 7.2.10: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Fortinet FortiClientEMS versions 7.4.0 through 7.4.1: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Fortinet FortiClientEMS versions 7.4.3 through 7.4.4: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00507
CVE-2025-59922
Affected Products
Forticlientems
References · 10
- https://fortiguard.fortinet.com/psirt/FG-IR-25-735 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00507 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-59922 · Security Note
- https://twitter.com/VulmonFeeds/status/2011155018632622299 · Twitter Post
- https://twitter.com/secharvesterx/status/2011408083021447194 · Twitter Post
- https://fortiguard.com/psirt/FG-IR-25-735 · Note
- https://twitter.com/_r_netsec/status/2011373499055772120 · Twitter Post
- https://twitter.com/CVEnew/status/2011120642624565375 · Twitter Post
- https://twitter.com/_cvereports/status/2012072015528665490 · Twitter Post
- https://reddit.com/r/fortinet/comments/1qxun3h/forticlient_ems_possible_unauthenticated_sql · Reddit Post