Path Traversal on File Content Extraction connector
Summary
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSOAR may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions.
| Version | Affected | Solution |
|---|---|---|
| FortiSOAR PaaS 7.6 | 7.6.0 through 7.6.3 | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR PaaS 7.5 | 7.5 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR PaaS 7.4 | 7.4 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR PaaS 7.3 | 7.3 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR on-premise 7.6 | 7.6.0 through 7.6.3 | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR on-premise 7.5 | 7.5 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR on-premise 7.4 | 7.4 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
| FortiSOAR on-premise 7.3 | 7.3 all versions | Upgrade to FortiSOAR File Content Extraction Connector Version 1.3.1 or above |
Acknowledgement
Internally discovered and reported by Shripal Rawal of Fortinet PSIRT team.Timeline
2026-04-14: Initial publication