
π―Fortinet found serious security holes in their FortiSandbox software that could let bad guys take control without needing a password. They also released updates for other products that need fixing. It's super important for companies using these tools to update them right away to stay safe.
What Happened
Fortinet has revealed two severe vulnerabilities in its FortiSandbox platform, both rated with a CVSSv3 score of 9.1. These flaws allow unauthenticated remote attackers to execute arbitrary commands and bypass authentication, posing a significant risk to enterprise environments that rely on FortiSandbox for advanced threat detection. On April 14, 2026, Fortinet also published security advisories addressing a total of 11 vulnerabilities across various products, including FortiSandbox, FortiAnalyzer, FortiManager, and FortiOS, urging immediate action from administrators.
The Flaw
The first vulnerability, CVE-2026-39808, is an OS Command Injection flaw. This weakness exists in the FortiSandbox API component, allowing attackers to send specially crafted HTTP requests that enable them to execute unauthorized code. With no authentication required, this vulnerability is classified as low complexity but high impact. Successful exploitation could lead to a complete compromise of the sandboxing environment. This flaw also affects FortiSandbox PaaS versions up to 23.4.4374.
The second vulnerability, CVE-2026-39813, is a Path Traversal flaw affecting the FortiSandbox JRPC API. This flaw enables unauthenticated attackers to bypass authentication controls through specially crafted HTTP requests, leading to potential privilege escalation. Like the first, it also carries a CVSSv3 score of 9.1, and it affects FortiSandbox versions 5.0.1 through 5.0.5.
What's at Risk
Organizations using FortiSandbox versions 4.4 and 5.0 are at risk. Specifically: Additionally, the vulnerabilities impact a broader range of Fortinet products, emphasizing the need for comprehensive patching across the affected systems.
FortiSandbox 4.4
FortiSandbox 5.0
FortiSandbox 5.2 and 4.2
Patch Status
Fortinet has acknowledged the vulnerabilities and is urging users to apply the necessary patches immediately. No exploitation has been observed in the wild as of the publication date, but the potential for attack is high given the critical nature of these vulnerabilities. Administrators are advised to prioritize patching the critical vulnerabilities in FortiSandbox before addressing other findings across FortiAnalyzer and FortiManager.
Immediate Actions
Organizations should: Security teams must treat these vulnerabilities as high-priority to safeguard their environments against potential exploitation.
Containment
- 1.Apply recommended patches to affected FortiSandbox versions.
- 2.Audit FortiSandbox deployments for exposure.
Remediation
- 3.Restrict API access to trusted networks as a temporary mitigation.
- 4.Review and patch other affected Fortinet products, including FortiAnalyzer and FortiManager, as outlined in the recent advisories.
With the release of security advisories addressing 11 vulnerabilities across Fortinet products, organizations must act swiftly to mitigate risks and protect their systems from potential exploitation.



