CVE-2026-21643
Fortinet FortiClientEMS SQL Injection
Description
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
INFO
Published Date :
Feb. 6, 2026, 9:15 a.m.
Last Modified :
March 30, 2026, 1:16 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 6abe59d8-c742-4dff-8ce8-9b0ca1073da8 | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update FortiClientEMS to a version that addresses this vulnerability.
- Apply vendor-supplied security patches and updates promptly.
- Validate system integrity after applying updates.
Public PoC/Exploit Available at Github
CVE-2026-21643 has a 7 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-21643.
| URL | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 | Vendor Advisory |
| https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-21643 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-21643
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
CVE-2026-21643
Python
Python PoC and Nuclei template for CVE-2026-21643 (Pre-Authentication SQL Injection in FortiClient EMS 7.4.4)
Python
Mirror of https://github.com/nomi-sec/PoC-in-GitHub
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
Latest CVEs with their Proof of Concept exploits.
Python HTML
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
bugbounty cve exp exploit payload poc rce vulnerability
Shell
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-21643 vulnerability anywhere in the article.
-
The Cyber Express
FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
A newly disclosed set of vulnerabilities affecting Fortinet’s endpoint management platform has raised serious concerns among cybersecurity professionals, particularly as both flaws are already being a ... Read more
-
The Register
Attackers exploited this critical FortiClient EMS bug as a 0-day
Fortinet released an emergency patch over the weekend for a critical FortiClient Enterprise Management Server (EMS) bug believed to be under attack since at least March 31. The flaw, tracked as CVE-20 ... Read more
-
CybersecurityNews
2,000+ FortiClient EMS Instances Exposed Online Amid Active RCE Vulnerability Exploits in the Wild
The Shadowserver Foundation has issued an urgent warning to FortiClient Enterprise Management Server (EMS) administrators after identifying over 2,000 publicly accessible instances globally, two of wh ... Read more
-
Help Net Security
Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost ... Read more
-
The Hacker News
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: ... Read more
-
TheCyberThrone
CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE
April 5, 2026Executive SummaryFortinet FortiClient Endpoint Management Server (EMS) versions 7.4.5 and 7.4.6 contain a critical improper access control vulnerability (CWE-284) in the API authenticatio ... Read more
-
Help Net Security
FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wild. This time around, the confirmation of ac ... Read more
-
Help Net Security
Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
A critical SQL injection vulnerability (CVE-2026-21643) in Fortinet FortiClient Endpoint Management Server (EMS), a management server for FortiClient endpoint agents on various platforms, is under act ... Read more
-
CybersecurityNews
Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks
A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643, is actively being exploited in the wild. Threat actors have been leveragin ... Read more
-
security.nl
'Kritiek SQL Injection-lek in Fortinet FortiClientEMS actief misbruikt bij aanvallen'
Een kritiek SQL Injection-beveiligingslek in Fortinet FortiClientEMS wordt al sinds een aantal dagen actief misbruikt bij aanvallen, zo waarschuwt securitybedrijf Defused. Fortinet kwam op 6 februari ... Read more
-
The Hacker News
⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a ... Read more
-
Daily CyberSecurity
PoC Exploit Publicly Disclosed: Windows ‘libarchive’ Flaw Leaks NetNTLMv2 Hashes
Security researchers Len Sadowski and Oğuz Bektaş have publicly pulled back the curtain on a vulnerability within Windows’ implementation of libarchive. The flaw, tracked as CVE-2025-59284, demonstrat ... Read more
-
Daily CyberSecurity
PoC Exploit Publicly Disclosed: ‘RegPwn’ Flaw Grants SYSTEM Access via Windows Accessibility
A newly discovered vulnerability, dubbed RegPwn, has pulled back the curtain on a significant security gap in the Windows Accessibility Infrastructure. Tracked as CVE-2026-24291, this local elevation ... Read more
-
CybersecurityNews
Critical FortiClient SQL Injection Vulnerability Enables Arbitrary Database Access
FortiClient SQL Injection vulnerability A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS). Tracked as CVE-2026-21643, this severe flaw carries a CVSS sc ... Read more
-
TheCyberThrone
Apple Patch Tuesday – February 2026
February 12, 2026Critical Security Updates Across iOS, macOS, and Apple EcosystemApple released a coordinated set of security updates on February 11, 2026, aligning with the global Patch Tuesday cycle ... Read more
-
TheCyberThrone
Critical SQL Injection in FortiClientEMS: CVE-2026-21643
February 12, 2026CVE-2026-21643 is a critical SQL injection vulnerability affecting Fortinet FortiClientEMS version 7.4.4, enabling unauthenticated attackers to execute arbitrary code via crafted HTTP ... Read more
-
The Hacker News
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE- ... Read more
-
CybersecurityNews
Critical FortiClientEMS Vulnerability Let Attackers Execute Malicious Code Remotely
FortiClientEMS RCE Vulnerability Fortinet has issued a critical security advisory warning administrators to immediately patch instances of FortiClientEMS, its central management solution for endpoint ... Read more
-
Daily CyberSecurity
Endpoint Exposed: Critical FortiClient EMS Flaw (CVSS 9.1) Allows Unauthenticated RCE
Fortinet has issued a high-priority security advisory for its FortiClient Enterprise Management Server (EMS), warning of a critical SQL injection vulnerability that could allow attackers to execute ar ... Read more
-
security.nl
Fortinet waarschuwt voor SQL Injection beveiligingslek in FortiClientEMS
Fortinet waarschuwt klanten voor een kritiek beveiligingslek in FortiClientEMS waardoor SQL Injection mogelijk is. Twee jaar geleden werd een andere SQL Injection kwetsbaarheid actief misbruikt bij aa ... Read more
The following table lists the changes that have been made to the
CVE-2026-21643 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 30, 2026
Action Type Old Value New Value Added Reference https://github.com/0xBlackash/CVE-2026-21643/blob/main/cve-2026-21643.py -
Initial Analysis by [email protected]
Feb. 17, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.5 Added Reference Type Fortinet, Inc.: https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 Types: Vendor Advisory -
New CVE Received by [email protected]
Feb. 06, 2026
Action Type Old Value New Value Added Description An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-89 Added Reference https://fortiguard.fortinet.com/psirt/FG-IR-25-1142