First published: Mon Mar 17 2025(Updated: )
An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 web interface may allow both authenticated remote attackers and non-authenticated attackers in the same network as the appliance to perform a stored cross site scripting attack (XSS) via injecting malicious payloads in different locations.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLC | <8.5.3<8.4.8<8.3.3 |
Please upgrade to FortiWLC version 8.6.1 or above. Please upgrade to FortiWLC version 8.5.4 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26087 has been assigned a severity rating of high due to potential exploitation by both authenticated and unauthenticated attackers.
To fix CVE-2021-26087, upgrade to FortiWLC version 8.6.0 or later, which addresses this vulnerability.
CVE-2021-26087 allows attackers to inject malicious content through improper input validation in the FortiWLC web interface.
CVE-2021-26087 affects FortiWLC versions 8.5.3 and below, 8.4.8 and below, and 8.3.3.
Both authenticated remote attackers and non-authenticated attackers on the same network can exploit CVE-2021-26087.