Description
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.4, FortiSandbox PaaS 5.0.0 through 5.0.4 may allow an attacker to perform an XSS attack via crafted HTTP requests.
Published: 2026-04-14
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting via crafted HTTP requests
Action: Patch Now
AI Analysis

Impact

Fortinet FortiSandbox 5.x suffers from an improper neutralization of input during web page generation, allowing an attacker to inject malicious JavaScript when a victim accesses a crafted URL. The injected code runs in the victim’s browser context and can steal session cookies, manipulate page content, or redirect to phishing sites. The flaw is a classic Cross‑Site Scripting weakness.

Affected Systems

Affected products are Fortinet FortiSandbox and FortiSandbox PaaS, versions 5.0.0 through 5.0.4. Any user deploying these releases is vulnerable unless a patch or upgrade has been applied.

Risk and Exploitability

The CVSS score of 4.9 indicates moderate severity, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation. An attacker can remotely craft a malicious HTTP request that targets the FortiSandbox web interface; the injected payload is displayed when a user views the resulting page, thus triggering the XSS. Although EPSS data is unavailable, the potential impact remains significant for exposed services.

Generated by OpenCVE AI on April 14, 2026 at 18:55 UTC.

Remediation

Vendor Solution

Upgrade to FortiSandbox PaaS version 5.0.5 or above Upgrade to FortiSandbox version 5.0.5 or above


OpenCVE Recommended Actions

  • Upgrade to FortiSandbox PaaS 5.0.5 or above
  • Upgrade to FortiSandbox 5.0.5 or above

Generated by OpenCVE AI on April 14, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortisandbox Paas
Vendors & Products Fortinet fortisandbox Paas

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting via Crafted HTTP Requests in FortiSandbox 5.0.0‑5.0.4

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.4, FortiSandbox PaaS 5.0.0 through 5.0.4 may allow an attacker to perform an XSS attack via crafted HTTP requests.
First Time appeared Fortinet
Fortinet fortisandbox
Fortinet fortisandboxpaas
Weaknesses CWE-79
CPEs cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisandbox
Fortinet fortisandboxpaas
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C'}


Subscriptions

Fortinet Fortisandbox Fortisandbox Paas Fortisandboxpaas
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-14T16:46:15.066Z

Reserved: 2025-10-03T08:50:52.097Z

Link: CVE-2025-61886

cve-icon Vulnrichment

Updated: 2026-04-14T16:37:06.673Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:31.800

Modified: 2026-04-14T16:16:31.800

Link: CVE-2025-61886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:57Z

Weaknesses