Advisory Details

January 28th, 2026

Fortinet FortiSandbox fortisandbox Server-Side Request Forgery Remote Code Execution Vulnerability

ZDI-26-048
ZDI-CAN-27307

CVE ID CVE-2025-67685
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Fortinet
AFFECTED PRODUCTS FortiSandbox
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of web sockets. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the current process.

ADDITIONAL DETAILS Fortinet has issued an update to correct this vulnerability. More details can be found at:
https://fortiguard.fortinet.com/psirt/FG-IR-25-783
DISCLOSURE TIMELINE
  • 2025-05-29 - Vulnerability reported to vendor
  • 2026-01-28 - Coordinated public release of advisory
  • 2026-01-28 - Advisory Updated
CREDIT Jason McFadyen of Trend Research
BACK TO ADVISORIES