CVE-2025-54972

Source
https://cve.org/CVERecord?id=CVE-2025-54972
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54972.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54972
Published
2025-11-18T17:16:03.890Z
Modified
2026-03-13T03:34:09.353412Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

An improper neutralization of crlf sequences ('crlf injection') vulnerability in Fortinet FortiMail 7.6.0 through 7.6.3, FortiMail 7.4.0 through 7.4.5, FortiMail 7.2 all versions, FortiMail 7.0 all versions may allow an attacker to inject headers in the response via convincing a user to click on a specifically crafted link

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54972.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "7.0.0"
            },
            {
                "fixed": "7.4.6"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "7.6.0"
            },
            {
                "fixed": "7.6.4"
            }
        ]
    }
]