CVE-2026-25691
Path Traversal in FortiSandbox Allows Arbitrary Directory Deletion
Publication date: 2026-04-14
Last updated on: 2026-04-22
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | fortisandbox_cloud | 5.0.4 |
| fortinet | fortisandbox | From 5.0.0 (inc) to 5.0.6 (exc) |
| fortinet | fortisandbox | From 4.2.0 (inc) to 4.4.9 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal issue in Fortinet FortiSandbox versions 4.2, 4.4.0 through 4.4.8, 5.0.0 through 5.0.5, FortiSandbox Cloud 5.0.4, and FortiSandbox PaaS 5.0.4. It allows a privileged attacker with a super-admin profile and command-line interface (CLI) access to delete arbitrary directories by sending specially crafted HTTP requests.
How can this vulnerability impact me? :
The vulnerability can lead to the deletion of arbitrary directories on the affected system, which may result in loss of important data or system files. Since the attacker needs super-admin privileges and CLI access, the impact is significant, potentially causing integrity and availability issues on the FortiSandbox device.