CVE-2026-25691 PUBLISHED

Assigner: fortinet
Reserved: 05.02.2026 Published: 14.04.2026 Updated: 14.04.2026

A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox 4.2 all versions, FortiSandbox Cloud 5.0.4, FortiSandbox PaaS 5.0.4 may allow a privileged attacker with super-admin profile and CLI access to delete an arbitrary directory via HTTP crafted requests.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H/E:F/RL:O/RC:C
CVSS Score: 6.2

Product Status

Vendor Fortinet
Product FortiSandbox PaaS
Versions Default: unaffected
  • Version 5.0.4 is affected
Vendor Fortinet
Product FortiSandbox Cloud
Versions Default: unaffected
  • Version 5.0.4 is affected
Vendor Fortinet
Product FortiSandbox
Versions Default: unaffected
  • affected from 5.0.0 to 5.0.5 (incl.)
  • affected from 4.4.0 to 4.4.8 (incl.)
  • affected from 4.2.1 to 4.2.8 (incl.)

Solutions

Fortinet remediated this issue in FortiSandbox Cloud version 5.0.5 and hence customers do not need to perform any action. Upgrade to upcoming FortiSandbox version 5.2.0 or above Upgrade to FortiSandbox version 5.0.6 or above Upgrade to FortiSandbox version 4.4.9 or above Upgrade to FortiSandbox PaaS version 5.0.5 or above

References

Problem Types

  • Execute unauthorized code or commands CWE