Description
A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.
Published: 2026-05-12
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authorization flaw (CWE-862) in Fortinet FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS allows an attacker who does not have valid credentials to send crafted HTTP requests that result in the execution of arbitrary code or system commands. The vulnerability directly compromises the integrity and availability of the sandbox environment and can lead to data exfiltration or lateral movement within an organization.

Affected Systems

The flaw affects Fortinet FortiSandbox versions 4.4.0 to 4.4.8 and 5.0.0 to 5.0.1, FortiSandbox Cloud versions 5.0.2 to 5.0.5, and all FortiSandbox PaaS releases from 21.3 up through 23.4, including the 5.0.x and 4.4.x lines. Administrators should verify the firmware or software version of their sandbox deployments against these ranges to determine exposure.

Risk and Exploitability

The CVSS score of 9.1 classifies the vulnerability as a critical risk, and the absence of an EPSS score does not reduce its severity. The issue is not listed in the CISA KEV catalog, but the attack can be executed remotely via HTTP without authentication, making it highly actionable from any environment where the FortiSandbox interface is exposed. The risk is significant for organizations that have not yet upgraded to the patched versions.

Generated by OpenCVE AI on May 12, 2026 at 20:53 UTC.

Remediation

Vendor Solution

Fortinet remediated this issue in FortiSandbox Cloud version 5.0.2 and hence customers do not need to perform any action. Fortinet remediated this issue in FortiSandbox Cloud version 4.4.9 and hence customers do not need to perform any action. Upgrade to FortiSandbox version 5.0.2 or above Upgrade to FortiSandbox version 4.4.9 or above Upgrade to FortiSandbox PaaS version 5.0.2 or above Upgrade to FortiSandbox PaaS version 4.4.9 or above


OpenCVE Recommended Actions

  • Upgrade FortiSandbox to version 5.0.2 or later
  • Upgrade FortiSandbox Cloud to version 5.0.2 or later
  • Upgrade FortiSandbox PaaS to version 5.0.2 or later

Generated by OpenCVE AI on May 12, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Authorization Failure in FortiSandbox Allowing Remote Code Execution

Tue, 12 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.
First Time appeared Fortinet
Fortinet fortisandbox
Fortinet fortisandboxcloud
Fortinet fortisandboxpaas
Weaknesses CWE-862
CPEs cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:21.3.4055:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:21.4.4072:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:22.1.4113:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4134:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4151:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:23.1.4245:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:23.3.4329:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4350:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4374:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxpaas:5.0.1:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisandbox
Fortinet fortisandboxcloud
Fortinet fortisandboxpaas
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C'}


Subscriptions

Fortinet Fortisandbox Fortisandboxcloud Fortisandboxpaas
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-05-13T03:58:29.159Z

Reserved: 2026-02-11T09:32:22.258Z

Link: CVE-2026-26083

cve-icon Vulnrichment

Updated: 2026-05-12T19:03:01.340Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T18:16:39.817

Modified: 2026-05-12T18:57:02.307

Link: CVE-2026-26083

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T21:00:13Z

Weaknesses