Description
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5 all versions, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.3, FortiSOAR on-premise 7.5 all versions, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions.
Published: 2026-04-14
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file access
Action: Immediate Patch
AI Analysis

Impact

An improperly limited pathname check in Fortinet FortiSOAR allows an authenticated remote attacker to use the File Content Extraction feature to read files outside of the intended directory, enabling disclosure of sensitive information. The flaw is a classic directory traversal (CWE‑22). No arbitrary code execution is described, but the ability to read arbitrary local files can lead to data leakage or serve as a foundation for more advanced attacks.

Affected Systems

Fortinet FortiSOAR PaaS and on‑premise deployments running any 7.3.x, 7.4.x, 7.5.x, or 7.6.x version up to 7.6.3 are impacted. The product line includes both cloud (PaaS) and on‑premises appliances.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.2 (medium). Exploit probability is not quantified by EPSS, and the issue is not currently listed in the CISA KEV catalog. The attack requires an authenticated session; an attacker must be able to log in to the FortiSOAR system and has access to the File Content Extraction functionality. Once the conditions are met, traversal paths can be constructed to read arbitrary files on the host.

Generated by OpenCVE AI on April 14, 2026 at 17:39 UTC.

Remediation

Vendor Solution

Upgrade to FortiSOAR on-premise version 7.6.4 or above Upgrade to FortiSOAR PaaS version 7.6.4 or above


OpenCVE Recommended Actions

  • Verify the current FortiSOAR version you are running
  • Upgrade FortiSOAR on‑premise to version 7.6.4 or later
  • Upgrade FortiSOAR PaaS to version 7.6.4 or later
  • Restart FortiSOAR services after the upgrade
  • Confirm that File Content Extraction now restricts access to the intended directory
  • If immediate upgrade is not possible, limit use of File Content Extraction to users with minimal privileges or block the endpoint until a patch is applied

Generated by OpenCVE AI on April 14, 2026 at 17:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Path Traversal Vulnerability in FortiSOAR Allowing Remote Authenticated File Access

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5 all versions, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.3, FortiSOAR on-premise 7.5 all versions, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions.
First Time appeared Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
Weaknesses CWE-22
CPEs cpe:2.3:a:fortinet:fortisoaron-premise:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.3:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C'}


Subscriptions

Fortinet Fortisoaron-premise Fortisoarpaas
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-14T16:46:14.901Z

Reserved: 2026-01-07T18:30:44.883Z

Link: CVE-2026-22573

cve-icon Vulnrichment

Updated: 2026-04-14T16:37:04.668Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:36.550

Modified: 2026-04-14T16:16:36.550

Link: CVE-2026-22573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses