No advisories yet.
Solution
Upgrade to FortiSIEM version 7.5.0 or above Upgrade to FortiSIEM version 7.4.1 or above Upgrade to FortiSIEM version 7.3.5 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-077 |
|
Thu, 12 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters. | |
| First Time appeared |
Fortinet
Fortinet fortisiem |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:fortinet:fortisiem:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.3.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:7.4.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortisiem |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-03-12T14:28:02.557Z
Reserved: 2026-02-09T17:14:29.451Z
Link: CVE-2026-25972
Updated: 2026-03-12T14:27:58.719Z
Status : Analyzed
Published: 2026-03-10T18:18:38.323
Modified: 2026-03-12T16:05:03.403
Link: CVE-2026-25972
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:49:16Z