Fortisandbox Paas

5 CVEs product

Monthly

CVE-2025-61886 MEDIUM This Month

Reflected cross-site scripting (XSS) in Fortinet FortiSandbox and FortiSandbox PaaS versions 5.0.0 through 5.0.4 allows unauthenticated remote attackers to inject malicious scripts via crafted HTTP requests. Exploitation requires user interaction (clicking a malicious link), resulting in session hijacking, credential theft, or malware distribution to administrators accessing the FortiSandbox web interface. No public exploit code or active exploitation has been confirmed at time of analysis.

Fortinet XSS Fortisandbox Paas Fortisandbox
NVD VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-39812 MEDIUM This Month

Stored cross-site scripting (XSS) in Fortinet FortiSandbox and FortiSandbox PaaS versions 4.2 through 5.0.5 allows authenticated administrators with high privileges to inject malicious scripts into web pages, leading to unauthorized code execution when other users interact with compromised content. The vulnerability requires user interaction (UI:R) and affects confidentiality and integrity but not availability. With a CVSS score of 4.8 and high privilege requirement (PR:H), this represents a moderate risk primarily to multi-user deployments where administrative accounts may be compromised or untrusted.

Fortinet XSS Fortisandbox Fortisandbox Paas
NVD VulDB
CVSS 3.1
4.8
EPSS
0.0%
CVE-2026-25691 MEDIUM This Month

Path traversal vulnerability in Fortinet FortiSandbox allows privileged super-admin users with CLI access to delete arbitrary directories on the system via crafted HTTP requests. Affects FortiSandbox 5.0.0-5.0.5, 4.4.0-4.4.8, 4.2 all versions, FortiSandbox Cloud 5.0.4, and FortiSandbox PaaS 5.0.4. CVSS 6.7 reflects high integrity and availability impact but requires authenticated super-admin privileges; no public exploit code or active KEV designation identified at time of analysis.

Fortinet Path Traversal Fortisandbox Paas Fortisandbox Cloud Fortisandbox
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2026-27316 LOW Monitor

Insufficiently protected credentials in Fortinet FortiSandbox 5.0.0-5.0.5, 4.4.x, and FortiSandbox PaaS 5.0.1-5.0.5 allow authenticated administrators to read LDAP server credentials via client-side inspection. This low-severity information disclosure requires high-privilege authentication and network access, exposing only credential confidentiality without enabling modification or denial of service.

Fortinet Information Disclosure Fortisandbox Fortisandbox Paas
NVD
CVSS 3.1
2.7
EPSS
0.0%
CVE-2026-39808 CRITICAL Act Now

OS command injection in Fortinet FortiSandbox 4.4.0 through 4.4.8 and FortiSandbox PaaS (versions 21.3 through 23.4) allows unauthenticated remote attackers to execute arbitrary commands or code via unsanitized input to vulnerable components. The CVSS 9.8 (Critical) score reflects network-accessible exploitation requiring no authentication or user interaction. No public exploit identified at time of analysis, though the vulnerability class (CWE-78) is commonly weaponized. Attack surface includes both on-premise FortiSandbox appliances and cloud-based PaaS offerings used for malware analysis.

Fortinet Command Injection Fortisandbox Fortisandbox Paas
NVD
CVSS 3.1
9.8
EPSS
0.3%
EPSS 0% CVSS 5.4
MEDIUM This Month

Reflected cross-site scripting (XSS) in Fortinet FortiSandbox and FortiSandbox PaaS versions 5.0.0 through 5.0.4 allows unauthenticated remote attackers to inject malicious scripts via crafted HTTP requests. Exploitation requires user interaction (clicking a malicious link), resulting in session hijacking, credential theft, or malware distribution to administrators accessing the FortiSandbox web interface. No public exploit code or active exploitation has been confirmed at time of analysis.

Fortinet XSS Fortisandbox Paas +1
NVD VulDB
EPSS 0% CVSS 4.8
MEDIUM This Month

Stored cross-site scripting (XSS) in Fortinet FortiSandbox and FortiSandbox PaaS versions 4.2 through 5.0.5 allows authenticated administrators with high privileges to inject malicious scripts into web pages, leading to unauthorized code execution when other users interact with compromised content. The vulnerability requires user interaction (UI:R) and affects confidentiality and integrity but not availability. With a CVSS score of 4.8 and high privilege requirement (PR:H), this represents a moderate risk primarily to multi-user deployments where administrative accounts may be compromised or untrusted.

Fortinet XSS Fortisandbox +1
NVD VulDB
EPSS 0% CVSS 6.7
MEDIUM This Month

Path traversal vulnerability in Fortinet FortiSandbox allows privileged super-admin users with CLI access to delete arbitrary directories on the system via crafted HTTP requests. Affects FortiSandbox 5.0.0-5.0.5, 4.4.0-4.4.8, 4.2 all versions, FortiSandbox Cloud 5.0.4, and FortiSandbox PaaS 5.0.4. CVSS 6.7 reflects high integrity and availability impact but requires authenticated super-admin privileges; no public exploit code or active KEV designation identified at time of analysis.

Fortinet Path Traversal Fortisandbox Paas +2
NVD
EPSS 0% CVSS 2.7
LOW Monitor

Insufficiently protected credentials in Fortinet FortiSandbox 5.0.0-5.0.5, 4.4.x, and FortiSandbox PaaS 5.0.1-5.0.5 allow authenticated administrators to read LDAP server credentials via client-side inspection. This low-severity information disclosure requires high-privilege authentication and network access, exposing only credential confidentiality without enabling modification or denial of service.

Fortinet Information Disclosure Fortisandbox +1
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

OS command injection in Fortinet FortiSandbox 4.4.0 through 4.4.8 and FortiSandbox PaaS (versions 21.3 through 23.4) allows unauthenticated remote attackers to execute arbitrary commands or code via unsanitized input to vulnerable components. The CVSS 9.8 (Critical) score reflects network-accessible exploitation requiring no authentication or user interaction. No public exploit identified at time of analysis, though the vulnerability class (CWE-78) is commonly weaponized. Attack surface includes both on-premise FortiSandbox appliances and cloud-based PaaS offerings used for malware analysis.

Fortinet Command Injection Fortisandbox +1
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy