CVE-2026-39812
Cross-Site Scripting in Fortinet FortiSandbox Enables Code Execution
Publication date: 2026-04-14
Last updated on: 2026-04-21
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | fortisandbox | From 4.2.0 (inc) to 4.2.8 (inc) |
| fortinet | fortisandbox_cloud | 5.0.4 |
| fortinet | fortisandbox | From 4.4.0 (inc) to 4.4.9 (exc) |
| fortinet | fortisandbox | From 5.0.0 (inc) to 5.0.6 (exc) |
| fortinet | fortisandbox_cloud | 5.0.5 |
| fortinet | fortisandbox_cloud | From 23.3.4329 (inc) to 24.1.4436 (inc) |
| fortinet | fortisandbox_cloud | From 22.2.4134 (inc) to 23.1.4260 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cross-site scripting (XSS) issue found in Fortinet FortiSandbox versions 4.2, 4.4.0 through 4.4.8, and 5.0.0 through 5.0.5, including FortiSandbox PaaS versions in the same ranges. It occurs due to improper neutralization of input during web page generation, which means that malicious input is not properly sanitized before being included in web pages.
As a result, an attacker may be able to execute unauthorized code or commands by injecting malicious scripts through the vulnerable input vector.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute unauthorized code or commands within the context of the affected web application. This could lead to unauthorized actions being performed, potential data theft, session hijacking, or other malicious activities depending on the privileges of the affected user.