Path Traversal in CLI

Summary

An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud may allow a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.

Version Affected Solution
FortiAnalyzer 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiAnalyzer 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiAnalyzer 7.2 7.2 all versions Migrate to a fixed release
FortiAnalyzer 7.0 7.0 all versions Migrate to a fixed release
FortiAnalyzer 6.4 Not affected Not Applicable
FortiAnalyzer Cloud 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiAnalyzer Cloud 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiAnalyzer Cloud 7.2 7.2 all versions Migrate to a fixed release
FortiAnalyzer Cloud 7.0 7.0 all versions Migrate to a fixed release
FortiManager 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiManager 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiManager 7.2 7.2 all versions Migrate to a fixed release
FortiManager 7.0 7.0 all versions Migrate to a fixed release
FortiManager 6.4 Not affected Not Applicable
FortiManager Cloud 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiManager Cloud 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiManager Cloud 7.2 7.2 all versions Migrate to a fixed release
FortiManager Cloud 7.0 7.0 all versions Migrate to a fixed release

Acknowledgement

Internally discovered and reported by David Maciejak of Fortinet Product Security team.

Timeline

2026-04-14: Initial publication