Cyber Posture

CVE-2024-27781

High

Published: 11 February 2025

Published
11 February 2025
Modified
14 January 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0751 91.8th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-27781 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Fortinet Fortisandbox. Its CVSS base score is 7.1 (High).

Operationally, ranked in the top 8.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates information input validation, directly addressing the improper neutralization of input during web page generation that enables this XSS vulnerability in FortiSandbox.

prevent

SI-15 requires information output filtering, preventing the injection of malicious scripts into generated web pages viewed by authenticated users exploiting this CVE.

prevent

SI-2 ensures timely flaw remediation through patching, directly mitigating this specific XSS vulnerability as recommended in the Fortinet advisory.

NVD Description

An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.4, FortiSandbox 4.2.1 through 4.2.6, FortiSandbox 4.0.0 through 4.0.4, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions allows an…

more

authenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

Deeper analysisAI

CVE-2024-27781 is a cross-site scripting (XSS) vulnerability stemming from improper neutralization of input during web page generation, classified under CWE-79. It affects multiple versions of Fortinet FortiSandbox, specifically 4.4.0 through 4.4.4, 4.2.1 through 4.2.6, 4.0.0 through 4.0.4, as well as all versions of 3.2, 3.1, and 3.0. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts under certain conditions.

An authenticated attacker with low privileges can exploit this vulnerability by sending crafted HTTP requests, potentially leading to the execution of unauthorized code or commands. Exploitation requires network access, high attack complexity, and user interaction, making it feasible in scenarios where a legitimate user with access to the FortiSandbox management interface is tricked into interacting with malicious content.

For mitigation details, refer to the Fortinet advisory at https://fortiguard.fortinet.com/psirt/FG-IR-24-063, which provides guidance on patches and workarounds for affected versions.

Details

CWE(s)

Affected Products

fortinet
fortisandbox
3.0.0 — 4.0.5 · 4.2.0 — 4.2.7 · 4.4.0 — 4.4.5

CVEs Like This One

CVE-2025-52436Same product: Fortinet Fortisandbox
CVE-2024-52960Same product: Fortinet Fortisandbox
CVE-2024-52961Same product: Fortinet Fortisandbox
CVE-2024-54027Same product: Fortinet Fortisandbox
CVE-2024-27778Same product: Fortinet Fortisandbox
CVE-2024-54018Same product: Fortinet Fortisandbox
CVE-2025-53949Same product: Fortinet Fortisandbox
CVE-2026-39808Same product: Fortinet Fortisandbox
CVE-2026-39813Same product: Fortinet Fortisandbox
CVE-2024-45328Same product: Fortinet Fortisandbox

References