{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-53679","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2025-07-08T09:23:05.010Z","datePublished":"2025-12-09T17:19:51.110Z","dateUpdated":"2026-02-26T16:56:59.835Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSandbox","cpes":["cpe:2.3:a:fortinet:fortisandbox:5.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"5.0.0","lessThanOrEqual":"5.0.2","status":"affected"},{"versionType":"semver","version":"4.4.0","lessThanOrEqual":"4.4.7","status":"affected"},{"versionType":"semver","version":"4.2.1","lessThanOrEqual":"4.2.8","status":"affected"},{"versionType":"semver","version":"4.0.0","lessThanOrEqual":"4.0.6","status":"affected"}]},{"vendor":"Fortinet","product":"FortiSandbox Cloud","cpes":["cpe:2.3:a:fortinet:fortisandboxcloud:24.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandboxcloud:23.4:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"24.1","status":"affected"},{"version":"23.4","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox Cloud 24.1, FortiSandbox Cloud 23 all versions allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T12:52:34.446Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiSandbox version 5.0.3 or above\nUpgrade to FortiSandbox version 4.4.8 or above\nFortinet remediated this issue in FortiSandbox Cloud version 24.2 (not released) and hence customers do not need to perform any action."}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-454","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-454"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-53679","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-12-10T04:57:29.061841Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:56:59.835Z"}}]}}