ID

VAR-202512-1753


CVE

CVE-2025-53679


DESCRIPTION

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0 through 5.0.2 and before 4.4.7 GUI allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.

Trust: 1.0

sources: NVD: CVE-2025-53679

AFFECTED PRODUCTS

vendor:fortinetmodel:fortisandboxscope:gteversion:5.0.0

Trust: 1.0

vendor:fortinetmodel:fortisandbox paasscope:eqversion:23.3

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:lteversion:4.4.7

Trust: 1.0

vendor:fortinetmodel:fortisandboxscope:lteversion:5.0.2

Trust: 1.0

vendor:fortinetmodel:fortisandbox paasscope:eqversion:24.1

Trust: 1.0

vendor:fortinetmodel:fortisandbox paasscope:eqversion:23.1

Trust: 1.0

vendor:fortinetmodel:fortisandbox paasscope:eqversion:23.4

Trust: 1.0

sources: NVD: CVE-2025-53679

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@fortinet.com: CVE-2025-53679
value: HIGH

Trust: 1.0

psirt@fortinet.com: CVE-2025-53679
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2025-53679

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2025-53679

EXTERNAL IDS

db:NVDid:CVE-2025-53679

Trust: 1.0

sources: NVD: CVE-2025-53679

REFERENCES

url:https://fortiguard.fortinet.com/psirt/fg-ir-25-454

Trust: 1.0

sources: NVD: CVE-2025-53679

SOURCES

db:NVDid:CVE-2025-53679

LAST UPDATE DATE

2025-12-19T22:38:34.295000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2025-53679date:2025-12-09T20:26:08.307

SOURCES RELEASE DATE

db:NVDid:CVE-2025-53679date:2025-12-09T18:15:53.477