CVE-2026-26083 (GCVE-0-2026-26083)
Vulnerability from cvelistv5 – Published: 2026-05-12 16:54 – Updated: 2026-05-13 03:58
VLAI?
Summary
A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.
Severity ?
9.1 (Critical)
CWE
- CWE-862 - Execute unauthorized code or commands
Assigner
References
1 reference
Impacted products
3 products
| Vendor | Product | Version | |
|---|---|---|---|
| Fortinet | FortiSandbox Cloud |
Affected:
5.0.0 , ≤ 5.0.1
(semver)
Affected: 4.4.5 , ≤ 4.4.8 (semver) cpe:2.3:a:fortinet:fortisandboxcloud:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxcloud:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxcloud:4.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxcloud:4.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxcloud:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxcloud:4.4.5:*:*:*:*:*:*:* |
|
| Fortinet | FortiSandbox |
Affected:
5.0.0 , ≤ 5.0.1
(semver)
Affected: 4.4.0 , ≤ 4.4.8 (semver) Affected: 4.2.1 , ≤ 4.2.8 (semver) cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:* |
|
| Fortinet | FortiSandbox PaaS |
Affected:
23.4.4374
Affected: 23.4.4350 Affected: 23.3.4329 Affected: 23.1.4245 Affected: 22.2.4151 Affected: 22.2.4134 Affected: 22.1.4113 Affected: 21.4.4072 Affected: 21.3.4055 Affected: 5.0.0 , ≤ 5.0.1 (semver) Affected: 4.4.5 , ≤ 4.4.8 (semver) cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4374:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4350:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:23.3.4329:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:23.1.4245:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4151:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4134:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:22.1.4113:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:21.4.4072:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:21.3.4055:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:4.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:4.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandboxpaas:4.4.5:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-26083",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-12T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T03:58:29.159Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:fortinet:fortisandboxcloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxcloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiSandbox Cloud",
"vendor": "Fortinet",
"versions": [
{
"lessThanOrEqual": "5.0.1",
"status": "affected",
"version": "5.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.4.8",
"status": "affected",
"version": "4.4.5",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiSandbox",
"vendor": "Fortinet",
"versions": [
{
"lessThanOrEqual": "5.0.1",
"status": "affected",
"version": "5.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.4.8",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.2.8",
"status": "affected",
"version": "4.2.1",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4374:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4350:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:23.3.4329:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:23.1.4245:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4151:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4134:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:22.1.4113:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:21.4.4072:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:21.3.4055:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiSandbox PaaS",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "23.4.4374"
},
{
"status": "affected",
"version": "23.4.4350"
},
{
"status": "affected",
"version": "23.3.4329"
},
{
"status": "affected",
"version": "23.1.4245"
},
{
"status": "affected",
"version": "22.2.4151"
},
{
"status": "affected",
"version": "22.2.4134"
},
{
"status": "affected",
"version": "22.1.4113"
},
{
"status": "affected",
"version": "21.4.4072"
},
{
"status": "affected",
"version": "21.3.4055"
},
{
"lessThanOrEqual": "5.0.1",
"status": "affected",
"version": "5.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.4.8",
"status": "affected",
"version": "4.4.5",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "Execute unauthorized code or commands",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-12T16:54:04.923Z",
"orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"shortName": "fortinet"
},
"references": [
{
"name": "https://fortiguard.fortinet.com/psirt/FG-IR-26-136",
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-26-136"
}
],
"solutions": [
{
"lang": "en",
"value": "Fortinet remediated this issue in FortiSandbox Cloud version 5.0.2 and hence customers do not need to perform any action.\nFortinet remediated this issue in FortiSandbox Cloud version 4.4.9 and hence customers do not need to perform any action.\nUpgrade to FortiSandbox version 5.0.2 or above\nUpgrade to FortiSandbox version 4.4.9 or above\nUpgrade to FortiSandbox PaaS version 5.0.2 or above\nUpgrade to FortiSandbox PaaS version 4.4.9 or above"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"assignerShortName": "fortinet",
"cveId": "CVE-2026-26083",
"datePublished": "2026-05-12T16:54:04.923Z",
"dateReserved": "2026-02-11T09:32:22.258Z",
"dateUpdated": "2026-05-13T03:58:29.159Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-26083",
"date": "2026-05-15",
"epss": "0.00044",
"percentile": "0.13723"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-26083\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2026-05-12T18:16:39.817\",\"lastModified\":\"2026-05-15T13:42:07.463\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0\",\"versionEndExcluding\":\"4.4.9\",\"matchCriteriaId\":\"0025C9C0-8D61-4563-96F9-F4E09DD83B26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.2\",\"matchCriteriaId\":\"42640C50-5490-4B50-840B-D35031671C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_cloud:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.2\",\"versionEndExcluding\":\"5.0.6\",\"matchCriteriaId\":\"BB973322-626C-4821-882A-125DD5177251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_cloud:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.1.4245\",\"versionEndIncluding\":\"23.4.4374\",\"matchCriteriaId\":\"7100CD0B-358B-4610-BB84-6E378571176D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_cloud:24.1.4436:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"529FB46C-C0E5-43F5-A753-DD9E928FD4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_paas:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.5\",\"versionEndExcluding\":\"4.4.9\",\"matchCriteriaId\":\"251F88A0-B42A-475B-80BA-1A6B53620EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_paas:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.2\",\"matchCriteriaId\":\"704EB14E-435A-4AC6-9FBC-C8A926BA22F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisandbox_paas:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.3.4055\",\"versionEndIncluding\":\"23.4.4374\",\"matchCriteriaId\":\"594E2353-2D20-400E-B9EA-7A08A49104B3\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.fortinet.com/psirt/FG-IR-26-136\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-26083\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-12T19:06:57.607584Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-12T19:03:01.340Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:fortinet:fortisandboxcloud:5.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxcloud:5.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxcloud:4.4.5:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiSandbox Cloud\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.0.1\"}, {\"status\": \"affected\", \"version\": \"4.4.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.8\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:fortisandbox:5.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiSandbox\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.0.1\"}, {\"status\": \"affected\", \"version\": \"4.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.8\"}, {\"status\": \"affected\", \"version\": \"4.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.2.8\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4374:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:23.4.4350:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:23.3.4329:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:23.1.4245:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4151:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:22.2.4134:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:22.1.4113:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:21.4.4072:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:21.3.4055:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:5.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:5.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortisandboxpaas:4.4.5:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiSandbox PaaS\", \"versions\": [{\"status\": \"affected\", \"version\": \"23.4.4374\"}, {\"status\": \"affected\", \"version\": \"23.4.4350\"}, {\"status\": \"affected\", \"version\": \"23.3.4329\"}, {\"status\": \"affected\", \"version\": \"23.1.4245\"}, {\"status\": \"affected\", \"version\": \"22.2.4151\"}, {\"status\": \"affected\", \"version\": \"22.2.4134\"}, {\"status\": \"affected\", \"version\": \"22.1.4113\"}, {\"status\": \"affected\", \"version\": \"21.4.4072\"}, {\"status\": \"affected\", \"version\": \"21.3.4055\"}, {\"status\": \"affected\", \"version\": \"5.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.0.1\"}, {\"status\": \"affected\", \"version\": \"4.4.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.8\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Fortinet remediated this issue in FortiSandbox Cloud version 5.0.2 and hence customers do not need to perform any action.\\nFortinet remediated this issue in FortiSandbox Cloud version 4.4.9 and hence customers do not need to perform any action.\\nUpgrade to FortiSandbox version 5.0.2 or above\\nUpgrade to FortiSandbox version 4.4.9 or above\\nUpgrade to FortiSandbox PaaS version 5.0.2 or above\\nUpgrade to FortiSandbox PaaS version 4.4.9 or above\"}], \"references\": [{\"url\": \"https://fortiguard.fortinet.com/psirt/FG-IR-26-136\", \"name\": \"https://fortiguard.fortinet.com/psirt/FG-IR-26-136\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21.3 all versions, FortiSandbox PaaS 5.0.0 through 5.0.1, FortiSandbox PaaS 4.4.5 through 4.4.8 may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"Execute unauthorized code or commands\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2026-05-12T16:54:04.923Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-26083\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-13T03:58:29.159Z\", \"dateReserved\": \"2026-02-11T09:32:22.258Z\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2026-05-12T16:54:04.923Z\", \"assignerShortName\": \"fortinet\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…