| CVE ID | CVE-2025-53949 |
| CVSS SCORE | 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Fortinet |
| AFFECTED PRODUCTS |
FortiSandbox |
| VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability. The specific flaw exists within the upload_vdi_file endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. |
| ADDITIONAL DETAILS |
Fortinet has issued an update to correct this vulnerability. More details can be found at:
https://fortiguard.fortinet.com/psirt/FG-IR-25-479 |
| DISCLOSURE TIMELINE |
|
| CREDIT | Jason McFadyen of Trend Research |