Multiple OS command injection in Web Vulnerability Scanner

Summary

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiADC may allow an authenticated attacker to execute unauthorized code via crafted HTTP requests.

Version Affected Solution
FortiADC 8.0 8.0 all versions Migrate to a fixed release
FortiADC 7.6 7.6 all versions Migrate to a fixed release
FortiADC 7.4 7.4 all versions Migrate to a fixed release
FortiADC 7.2 7.2 all versions Migrate to a fixed release
FortiADC 7.1 7.1 all versions Migrate to a fixed release
FortiADC 7.0 7.0 all versions Migrate to a fixed release
FortiADC 6.2 6.2 all versions Migrate to a fixed release
FortiADC 6.1 6.1 all versions Migrate to a fixed release
FortiADC 6.0 6.0 all versions Migrate to a fixed release
FortiADC 5.4 5.4 all versions Migrate to a fixed release
FortiADC 5.3 5.3 all versions Migrate to a fixed release
FortiADC 5.2 5.2 all versions Migrate to a fixed release
FortiADC 5.1 5.1 all versions Migrate to a fixed release
FortiADC 5.0 5.0 all versions Migrate to a fixed release
FortiADC 4.8 4.8 all versions Migrate to a fixed release
FortiADC 4.7 4.7 all versions Migrate to a fixed release
FortiADC 4.6 4.6 all versions Migrate to a fixed release
FortiADC 4.5 4.5 all versions Migrate to a fixed release
FortiADC 4.4 4.4 all versions Migrate to a fixed release
FortiADC 4.3 4.3 all versions Migrate to a fixed release
FortiADC 4.2 4.2 all versions Migrate to a fixed release
FortiADC 4.1 4.1 all versions Migrate to a fixed release
FortiADC 4.0 4.0 all versions Migrate to a fixed release
FortiADC 3.2 3.2 all versions Migrate to a fixed release
FortiADC 3.1 3.1 all versions Migrate to a fixed release
FortiADC 3.0 3.0 all versions Migrate to a fixed release

Acknowledgement

Fortinet is pleased to thank Kentaro Kawane from GMO Cybersecurity by Ierae for reporting this vulnerability under responsible disclosure.

Timeline

2025-06-10: Initial publication