<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(kudelskisecurity.com) Critical Unauthenticated SQL Injection Vulnerability in FortiClient EMS 7.4.4 Under Active Exploitation]]></title><description><![CDATA[<p>(kudelskisecurity.com) Critical Unauthenticated SQL Injection Vulnerability in FortiClient EMS 7.4.4 Under Active Exploitation</p><p>Critical unauthenticated SQLi in FortiClient EMS 7.4.4 (CVE-2026-21643) actively exploited—51 attacking IPs observed. Immediate patching required.</p><p>In brief - A severe unauthenticated SQL injection flaw in Fortinet FortiClient EMS 7.4.4 (CVE-2026-21643) is under active exploitation, with 51 distinct IPs targeting vulnerable instances. Successful exploitation risks unauthorized data access or manipulation via the EMS administrative interface. Patch to 7.4.5+ or apply mitigations urgently.</p><p>Technically - CVE-2026-21643 enables unauthenticated SQLi via crafted `Site` HTTP headers to `/api/v1/init_consts` in FortiClient EMS 7.4.4. Inadequate input sanitization allows arbitrary SQL execution, with public exploit code available. Mitigations include upgrading to 7.4.5/7.4.7, restricting admin interface access, and deploying a WAF to block malicious requests.</p><p>Source: <a href="https://kudelskisecurity.com/research/forticlient-ems-7-4-4-critical-sql-injection-flaw" rel="nofollow noopener"><span>https://</span><span>kudelskisecurity.com/research/</span><span>forticlient-ems-7-4-4-critical-sql-injection-flaw</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/2f17583c-6e06-46d6-b191-b3837cf3bdb7/kudelskisecurity.com-critical-unauthenticated-sql-injection-vulnerability-in-forticlient-ems-7.4.4-under-active-exploitation</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 10:24:52 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/2f17583c-6e06-46d6-b191-b3837cf3bdb7.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 15:49:21 GMT</pubDate><ttl>60</ttl></channel></rss>