The flaws, published on April 14, 2026, could allow unauthenticated remote attackers to execute arbitrary commands and bypass authentication entirely, posing a serious risk to enterprise environments relying on FortiSandbox for advanced threat detection.
The first vulnerability, tracked as CVE-2026-39808, is an Improper Neutralization of Special Elements used in an OS Command, classified under CWE-78.
The flaw resides in the FortiSandbox API component and enables an unauthenticated attacker to execute unauthorized code or commands by sending specially crafted HTTP requests.
With no authentication required and a network-based attack vector, this vulnerability represents a low-complexity, high-impact threat. Successful exploitation could result in full compromise of the sandboxing environment, undermining the very system designed to analyze and contain malicious files.
Affected versions and remediation:
The vulnerability was responsibly disclosed by Samuel de Lucas Maroto from KPMG Spain, and Fortinet has acknowledged the researcher’s contribution.
The second critical vulnerability, CVE-2026-39813, is a Path Traversal flaw classified under CWE-24, affecting the FortiSandbox JRPC API.
An unauthenticated attacker can exploit this weakness using specially crafted HTTP requests to bypass authentication controls, with the primary impact being escalation of privilege.
Like the first flaw, this vulnerability also carries a CVSSv3 score of 9.1 and requires no user interaction or prior authentication, making it equally dangerous in exposed deployments. This vulnerability was internally discovered and reported by Loic Pantano of Fortinet PSIRT.
Affected versions and remediation:
Neither vulnerability has been observed as exploited in the wild as of publication, but given their critical severity scores and unauthenticated attack vectors, organizations should treat these disclosures as high-priority.
Security teams are urged to apply the recommended patches immediately, audit FortiSandbox deployments for exposure, and restrict API access to trusted networks as a temporary mitigation while updates are being rolled out.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Critical FortiSandbox Vulnerabilities Allow Attackers to Execute Unauthorized Commands appeared first on Cyber Security News.
Disney Lorcana Trading Card Game by Ravensburger revealed a ton of exciting details for its…
Today’s deals are solid, and one huge highlight is that Amazon has brought back its…
Amazon is once again having its popular '3 for $33' movie sale full of some…
Don't miss this rare opportunity to score a well-regarded pair of noise canceling headphones for…
It's been a rough year for gaming hardware. Devices from across the industry are going…
LEGO Batman: Legacy of the Dark Knight is pulling from everything in the world of…
This website uses cookies.