{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "4.0.0"
              },
              {
                "fixed": "4.4.8"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "5.0.0"
              },
              {
                "fixed": "5.0.3"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "23.1.4245"
              },
              {
                "fixed": "23.4.4374"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "24.1.4436"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox Cloud 24.1, FortiSandbox Cloud 23 all versions allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.",
  "id": "CVE-2025-53679",
  "modified": "2026-03-10T21:48:47.493910131Z",
  "published": "2025-12-09T18:15:53.477Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-454"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}