Critical SQL Injection Vulnerability in FortiClient EMS
A critical SQL injection vulnerability identified as CVE-2026-21643 has been discovered in FortiClient Endpoint Management Server (EMS), as reported by Fortinet. Current assessments reveal that this flaw is actively being exploited, posing significant risk to organizational security when exposed on the public internet.
The vulnerability is fundamentally rooted in improper handling of SQL command elements, specifically related to a mishandled HTTP header that identifies tenant context. This design flaw allows attackers to forge malicious requests that are integrated directly into SQL queries before any authentication is processed. Consequently, unauthorized users can exploit this weakness to run arbitrary SQL commands, potentially accessing sensitive data such as administrative credentials and security policies. The criticality of this vulnerability is underscored by its high CVSS score of 9.8, indicating the severe implications of such exploitation.
In practical terms, organizations with their FortiClient EMS interfaces accessible via the internet are at an elevated risk. Attackers can remotely engage with the web interface over HTTPS and execute specially crafted requests containing the malicious HTTP header, leading to unauthorized database access. The implications of this vulnerability are profound, allowing attackers to compromise backend databases and manipulate sensitive information without any prior authentication checks.
Defensive Context
Entities utilizing FortiClient EMS are most at risk, particularly those with internet-facing administrative interfaces. Organizations that have implemented protective network segmentation or restricted access policies may experience lesser risks compared to those with open public access.
Why This Matters
The real-world consequences can be dire for affected organizations, which may suffer from data breaches, leakage of sensitive information, and potential unauthorized command execution on their servers. Firms in sectors handling sensitive data, particularly finance and healthcare, need to be vigilant as they can be prime targets for exploitation.
Defender Considerations
To manage this critical vulnerability, affected organizations must upgrade their FortiClient EMS systems from version 7.4.4 to 7.4.5 or later, where the vulnerability is addressed. Additionally, limiting public access to the administrative interface and enforcing secure access measures such as VPNs can further diminish exposure to this threat.
Indicators of Compromise (IOCs)
– CVE-ID: CVE-2026-21643
– CVSS Score: 9.8 (Critical)
– Affected Product: Fortinet FortiClient EMS (versions 7.4.4 and earlier)



