Impact
An improper limitation of a pathname to a restricted directory allows an attacker with super‑admin privileges and CLI access to delete any directory through crafted HTTP requests. The flaw can lead to loss of sandbox data and disruption of security monitoring activities. The weakness is a classic path traversal (CWE‑22).
Affected Systems
Fortinet FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS are affected. Vulnerable versions include FortiSandbox 5.0.0–5.0.5, 4.4.0–4.4.8, and all 4.2.x releases; FortiSandbox Cloud 5.0.4; FortiSandbox PaaS 5.0.4.
Risk and Exploitability
The CVSS score is 6.2, indicating medium severity. Exploitation requires super‑admin credentials and CLI access, which limits the attack surface to internal or privileged users. While EPSS data is not available and the vulnerability is not listed in KEV, the potential to delete critical directories makes it a significant risk for affected installations.
OpenCVE Enrichment