A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
Advisories

No advisories yet.

Fixes

Solution

Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above


Workaround

No workaround given by the vendor.

References
History

Fri, 06 Jun 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiwlm
CPEs cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwlm

Thu, 19 Dec 2024 00:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-94
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Dec 2024 22:00:00 +0900

Type Values Removed Values Added
Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-12-20T04:55:50.572Z

Reserved: 2023-06-09T06:59:37.970Z

Link: CVE-2023-34990

cve-icon Vulnrichment

Updated: 2024-12-18T14:29:57.561Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-18T13:15:05.547

Modified: 2025-06-05T15:32:55.290

Link: CVE-2023-34990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses