An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox Cloud 24.1, FortiSandbox Cloud 23 all versions allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-454 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Jan 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox Cloud 24.1, FortiSandbox Cloud 23 all versions allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests. |
09 Dec 2025, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-454 - Vendor Advisory | |
| CPE | cpe:2.3:a:fortinet:_fortisandbox_paas:23.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:_fortisandbox_paas:23.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:_fortisandbox_paas:24.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:_fortisandbox_paas:23.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* |
|
| First Time |
Fortinet
Fortinet fortisandbox Fortinet Fortisandbox Paas |
09 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 18:15
Updated : 2026-01-14 13:16
NVD link : CVE-2025-53679
Mitre link : CVE-2025-53679
CVE.ORG link : CVE-2025-53679
JSON object : View
Products Affected
fortinet
- _fortisandbox_paas
- fortisandbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
