A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
References
History

Thu, 05 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiwlm
CPEs cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwlm

Wed, 18 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Dec 2024 13:00:00 +0000

Type Values Removed Values Added
Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2024-12-18T12:44:38.664Z

Updated: 2024-12-20T04:55:50.572Z

Reserved: 2023-06-09T06:59:37.970Z

Link: CVE-2023-34990

cve-icon Vulnrichment

Updated: 2024-12-18T14:29:57.561Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-18T13:15:05.547

Modified: 2025-06-05T15:32:55.290

Link: CVE-2023-34990

cve-icon Redhat

No data.