CVE-2026-39808

CRITICAL NUCLEI

Fortinet FortiSandbox < 4.4.8 - Command Injection

Title source: rule

Description

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Exploits (4)

nomisec WORKING POC 1 stars
by ynsmroztas · poc
https://github.com/ynsmroztas/FortiSandbox-RCE-Exploit-CVE-2026-39808
nomisec WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2026-39808
nomisec WORKING POC
by samu-delucas · poc
https://github.com/samu-delucas/CVE-2026-39808
nomisec SUSPICIOUS
by Lechansky · poc
https://github.com/Lechansky/CVE-2026-39808

Nuclei Templates (1)

Fortinet FortiSandbox - Command Injection
CRITICALVERIFIEDby DhiyaneshDk
Shodan: http.title:"FortiSandbox"
FOFA: title="FortiSandbox"

Scores

CVSS v3 9.8
EPSS 0.1127
EPSS Percentile 93.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (11)
Fortinet/FortiSandbox 4.4.0 - 4.4.8
fortinet/fortisandbox 4.4.0 - 4.4.9
Fortinet/FortiSandbox PaaS 21.3.4055
Fortinet/FortiSandbox PaaS 21.4.4072
Fortinet/FortiSandbox PaaS 22.1.4113
Fortinet/FortiSandbox PaaS 22.2.4134
Fortinet/FortiSandbox PaaS 22.2.4151
Fortinet/FortiSandbox PaaS 23.1.4245
Fortinet/FortiSandbox PaaS 23.3.4329
Fortinet/FortiSandbox PaaS 23.4.4350
... and 1 more
Published Apr 14, 2026
Tracked Since Apr 14, 2026