CVE-2026-21742
Cleartext Password Exposure in Fortinet FortiSOAR Secure Queries
Publication date: 2026-04-14
Last updated on: 2026-05-06
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | fortisoar | From 7.6.0 (inc) to 7.6.4 (exc) |
| fortinet | fortisoar | From 7.3.0 (inc) to 7.5.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-319 | The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability involves the cleartext transmission of sensitive information, specifically passwords, which may be viewed by an authenticated attacker. Such exposure of sensitive data can potentially lead to non-compliance with data protection standards and regulations like GDPR and HIPAA, which require the protection of sensitive information during transmission.
However, the provided information does not explicitly describe the impact on compliance with these standards or regulations.
Can you explain this vulnerability to me?
This vulnerability involves the cleartext transmission of sensitive information in Fortinet FortiSOAR products, including both PaaS and on-premise versions across multiple releases. An authenticated attacker may be able to view cleartext passwords in responses related to Secure Message Exchange and Radius queries if these features are configured.
How can this vulnerability impact me? :
The vulnerability could allow an authenticated attacker to obtain sensitive passwords in cleartext, potentially compromising the security of the affected system. This exposure could lead to unauthorized access or further exploitation within the network or system where FortiSOAR is deployed.