CVE-2026-21643
Fortinet FortiClient EMS SQL Injection Vulnerability - [Actively Exploited]
Description
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
INFO
Published Date :
Feb. 6, 2026, 9:15 a.m.
Last Modified :
April 14, 2026, 2:21 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Unknown
https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21643
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 6abe59d8-c742-4dff-8ce8-9b0ca1073da8 | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update FortiClientEMS to a version that addresses this vulnerability.
- Apply vendor-supplied security patches and updates promptly.
- Validate system integrity after applying updates.
Public PoC/Exploit Available at Github
CVE-2026-21643 has a 10 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-21643.
| URL | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 | Vendor Advisory |
| https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py | Exploit |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643 | US Government Resource |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-21643 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-21643
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Go HTML JavaScript CSS TypeScript
CLI threat intel scanner. Check IPs, domains, hashes, CVEs against 1M+ IOCs from your terminal. npx dugganusa-lookup
JavaScript
VS Code extension: scan code for IPs, domains, hashes, and CVEs against 1M+ threat indicators in real-time. Powered by the DugganUSA STIX feed.
JavaScript
CVE-2026-21643
Python
Python PoC and Nuclei template for CVE-2026-21643 (Pre-Authentication SQL Injection in FortiClient EMS 7.4.4)
Python
Mirror of https://github.com/nomi-sec/PoC-in-GitHub
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
Latest CVEs with their Proof of Concept exploits.
Python HTML
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
bugbounty cve exp exploit payload poc rce vulnerability
Shell
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-21643 vulnerability anywhere in the article.
-
TheCyberThrone
Fortinet FortiSandbox — Critical Vulnerability Advisory
April 16, 2026Fortinet published a sweeping security advisory on April 14, 2026, disclosing multiple vulnerabilities across its FortiSandbox platform. Two of the flaws are rated Critical with unauthen ... Read more
-
Daily CyberSecurity
Critical 9.1 Flaws Hit Fortinet FortiSandbox
Fortinet has issued an urgent advisory regarding two critical vulnerabilities in its FortiSandbox platform—vulnerabilities that could allow unauthenticated attackers to bypass security entirely and se ... Read more
-
CybersecurityNews
CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical security flaw in Fortinet products. On April 13, 2026, the agency added a severe SQL injec ... Read more
-
Daily CyberSecurity
CISA Adds 7 Fresh Exploits to KEV Catalog
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog, adding seven high-risk flaws that are currently being weaponized by maliciou ... Read more
-
The Hacker News
CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitatio ... Read more
-
TheCyberThrone
CISA Adds Seven Vulnerabilities to KEV Catalog — April 13, 2026
CISA has expanded the Known Exploited Vulnerabilities catalog with seven new entries on April 13, 2026, based on evidence of active exploitation. The batch spans three vendors — Microsoft, Adobe, and ... Read more
-
The Cyber Express
FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
A newly disclosed set of vulnerabilities affecting Fortinet’s endpoint management platform has raised serious concerns among cybersecurity professionals, particularly as both flaws are already being a ... Read more
-
The Register
Attackers exploited this critical FortiClient EMS bug as a 0-day
Fortinet released an emergency patch over the weekend for a critical FortiClient Enterprise Management Server (EMS) bug believed to be under attack since at least March 31. The flaw, tracked as CVE-20 ... Read more
-
CybersecurityNews
2,000+ FortiClient EMS Instances Exposed Online Amid Active RCE Vulnerability Exploits in the Wild
The Shadowserver Foundation has issued an urgent warning to FortiClient Enterprise Management Server (EMS) administrators after identifying over 2,000 publicly accessible instances globally, two of wh ... Read more
-
Help Net Security
Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost ... Read more
-
The Hacker News
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: ... Read more
-
TheCyberThrone
CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE
April 5, 2026Executive SummaryFortinet FortiClient Endpoint Management Server (EMS) versions 7.4.5 and 7.4.6 contain a critical improper access control vulnerability (CWE-284) in the API authenticatio ... Read more
-
Help Net Security
FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wild. This time around, the confirmation of ac ... Read more
-
Help Net Security
Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
A critical SQL injection vulnerability (CVE-2026-21643) in Fortinet FortiClient Endpoint Management Server (EMS), a management server for FortiClient endpoint agents on various platforms, is under act ... Read more
-
CybersecurityNews
Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks
A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643, is actively being exploited in the wild. Threat actors have been leveragin ... Read more
-
security.nl
'Kritiek SQL Injection-lek in Fortinet FortiClientEMS actief misbruikt bij aanvallen'
Een kritiek SQL Injection-beveiligingslek in Fortinet FortiClientEMS wordt al sinds een aantal dagen actief misbruikt bij aanvallen, zo waarschuwt securitybedrijf Defused. Fortinet kwam op 6 februari ... Read more
-
The Hacker News
⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a ... Read more
-
Daily CyberSecurity
PoC Exploit Publicly Disclosed: Windows ‘libarchive’ Flaw Leaks NetNTLMv2 Hashes
Security researchers Len Sadowski and Oğuz Bektaş have publicly pulled back the curtain on a vulnerability within Windows’ implementation of libarchive. The flaw, tracked as CVE-2025-59284, demonstrat ... Read more
-
Daily CyberSecurity
PoC Exploit Publicly Disclosed: ‘RegPwn’ Flaw Grants SYSTEM Access via Windows Accessibility
A newly discovered vulnerability, dubbed RegPwn, has pulled back the curtain on a significant security gap in the Windows Accessibility Infrastructure. Tracked as CVE-2026-24291, this local elevation ... Read more
-
CybersecurityNews
Critical FortiClient SQL Injection Vulnerability Enables Arbitrary Database Access
FortiClient SQL Injection vulnerability A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS). Tracked as CVE-2026-21643, this severe flaw carries a CVSS sc ... Read more
The following table lists the changes that have been made to the
CVE-2026-21643 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Apr. 14, 2026
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.5 OR *cpe:2.3:a:fortinet:forticlientems:7.4.4:*:*:*:*:*:*:* Added Reference Type CISA-ADP: https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py Types: Exploit Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643 Types: US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Apr. 13, 2026
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21643 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 30, 2026
Action Type Old Value New Value Added Reference https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py -
Initial Analysis by [email protected]
Feb. 17, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.5 Added Reference Type Fortinet, Inc.: https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 Types: Vendor Advisory -
New CVE Received by [email protected]
Feb. 06, 2026
Action Type Old Value New Value Added Description An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-89 Added Reference https://fortiguard.fortinet.com/psirt/FG-IR-25-1142