{"id":"CVE-2025-54971","details":"An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission  to get the external resources password via the logs of the product","modified":"2026-03-13T03:34:09.301557Z","published":"2025-11-18T17:16:03.680Z","references":[{"type":"ADVISORY","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-686"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54971.json","unresolved_ranges":[{"events":[{"introduced":"6.2.0"},{"fixed":"7.4.3"}]}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}