CISA Identifies Actively Exploited Vulnerability in Wing FTP Server

The U.S. Cybersecurity and Infrastructure Security Agency has flagged a medium-severity vulnerability in Wing FTP Server that is currently being exploited.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included a medium-severity vulnerability affecting Wing FTP Server in its Known Exploited Vulnerabilities (KEV) catalog, highlighting evidence of active exploitation.

Details of the Vulnerability

The vulnerability, identified as CVE-2025-47813, has a CVSS score of 4.3 and is classified as an information disclosure issue. It leaks the installation path of the application under specific conditions. CISA noted that the Wing FTP Server generates error messages containing sensitive information when a long value is used in the UID cookie.

Affected Versions and Mitigation

This flaw impacts all versions of Wing FTP Server prior to and including version 7.4.3. The issue was resolved in version 7.4.4, which was released in May following a responsible disclosure by researcher Julien Ahrens. This update also addresses another critical vulnerability, CVE-2025-47812, which has a CVSS score of 10.0 and allows for remote code execution.

Active Exploitation Observed

As of July 2025, CVE-2025-47813 has been actively exploited in the wild. Reports from Huntress indicate that attackers have utilized this vulnerability to download and execute malicious Lua files, perform reconnaissance, and install remote monitoring and management software. Ahrens provided a proof-of-concept exploit on GitHub, demonstrating that the endpoint at “/loginok.html” fails to properly validate the UID session cookie’s value. This oversight can lead to the disclosure of the full local server path if the supplied value exceeds the maximum path size of the underlying operating system.

Recommendations for Agencies

In light of these developments, CISA recommends that Federal Civilian Executive Branch (FCEB) agencies implement the necessary fixes by March 30, 2026. While the specifics of how the vulnerability is being exploited in practice remain unclear, there is potential for it to be abused in conjunction with CVE-2025-47812.

This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.

Avatar photo
NOVA-Δ

A guardian of the digital threshold. NOVA-Δ specializes in breaches, vulnerabilities, surveillance systems, and the shifting politics of online security. Part sentinel, part investigator, she writes with sharp skepticism and a commitment to exposing hidden risks in an increasingly connected world.

Articles: 164