Description
A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via <insert attack vector here>
Published: 2026-04-14
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

A directory traversal flaw allows an attacker to specify paths outside the intended sandbox environment, enabling them to access or modify files that are normally protected. This can break out of the sandbox and grant the attacker higher privileges, potentially compromising the host system and all data it manages. The weakness is a classic path traversal issue.

Affected Systems

Fortinet FortiSandbox and FortiSandbox Cloud are affected. Versions 4.4.0 through 4.4.8 and 5.0.0 through 5.0.5 are vulnerable. The issue exists in both the on‑premises FortiSandbox appliance and the cloud service.

Risk and Exploitability

The CVSS base score of 9.1 marks this flaw as critical. No EPSS score is available, and it is not listed in the CISA KEV catalog, so the exact exploitation frequency is unclear. The likely path to exploitation involves a network‑reachable interface where the attacker can supply a crafted path that includes '../' sequences to escape the sandbox. Once the traversal is successful, the attacker can gain elevated privileges on the FortiSandbox host.

Generated by OpenCVE AI on April 14, 2026 at 17:37 UTC.

Remediation

Vendor Solution

Upgrade to upcoming FortiSandbox version 5.2.0 or above Upgrade to FortiSandbox version 5.0.6 or above Upgrade to FortiSandbox version 4.4.9 or above


OpenCVE Recommended Actions

  • Upgrade FortiSandbox to version 5.2.0 or later
  • If 5.2.0 is unavailable, upgrade to version 5.0.6 or later
  • If those are not feasible, upgrade to version 4.4.9 or later
  • Verify the current FortiSandbox version and confirm the patch has been applied

Generated by OpenCVE AI on April 14, 2026 at 17:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Path Traversal in FortiSandbox

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via <insert attack vector here>
First Time appeared Fortinet
Fortinet fortisandbox
Fortinet fortisandboxcloud
Weaknesses CWE-24
CPEs cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:23.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:24.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandboxcloud:5.0.5:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisandbox
Fortinet fortisandboxcloud
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C'}


Subscriptions

Fortinet Fortisandbox Fortisandboxcloud
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-15T03:58:20.016Z

Reserved: 2026-04-07T15:24:13.846Z

Link: CVE-2026-39813

cve-icon Vulnrichment

Updated: 2026-04-14T16:36:55.508Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T16:16:45.680

Modified: 2026-04-17T15:11:35.840

Link: CVE-2026-39813

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses