Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2025-47813: Wing FTP Server Path Disclosure Enables RCE Chain
CVE-2025-47813: Wing FTP Server Path Disclosure Enables RCE Chain
SECURITYMEDIUMCVE-2025-47813

CVE-2025-47813: Wing FTP Server Path Disclosure Enables RCE Chain

CISA has added CVE-2025-47813, a medium-severity information disclosure flaw in Wing FTP Server, to its KEV catalog after confirming active exploitation...

Dylan H.

Security Team

March 16, 2026
5 min read

Affected Products

  • Wing FTP Server <= 7.4.3

Medium-Severity Flaw Used to Unlock Critical RCE

CISA added CVE-2025-47813 to its Known Exploited Vulnerabilities (KEV) catalog on March 16, 2026, flagging the flaw as actively exploited in attacks targeting Wing FTP Server deployments worldwide.

Although the vulnerability carries only a CVSS v3.1 score of 4.3 (Medium), its operational significance is far greater: it is the reconnaissance enabler for CVE-2025-47812 (CVSS 10.0 — Critical), a pre-authenticated remote code execution flaw in the same software. Attackers use CVE-2025-47813 to leak the server's installation path, then craft a precise payload for CVE-2025-47812 to achieve unauthenticated RCE with SYSTEM/root privileges.

Federal Civilian Executive Branch (FCEB) agencies must patch by March 30, 2026.


Vulnerability Details

DetailValue
CVECVE-2025-47813
CVSS v3.14.3 (Medium)
CVSS v4.05.3 (Medium)
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
TypeInformation Disclosure — Error Message Contains Sensitive Data
Attack VectorNetwork — requires low-privilege authentication
Affected VersionsWing FTP Server ≤ 7.4.3
Fixed VersionWing FTP Server v7.4.4 (May 14, 2025)
KEV AddedMarch 16, 2026
FCEB Patch DeadlineMarch 30, 2026
Discovered ByJulien Ahrens, RCE Security

How the Vulnerability Works

The flaw resides in Wing FTP Server's post-authentication handler at /loginok.html. When a POST request is sent to that endpoint with an excessively long value in the UID cookie, the server fails to handle the input gracefully and returns a verbose error message that includes the full local filesystem installation path (e.g., C:\Program Files\WingFTP\...).

The root cause is improper error handling — the server exposes internal path information instead of returning a sanitized error response.

The Two-Step Kill Chain

CVE-2025-47813 is not dangerous in isolation, but serves as the first step in an attacker-documented chain:

StepCVECVSSAction
1 — ReconCVE-2025-478134.3Send overlong UID cookie to leak server installation path
2 — RCECVE-2025-4781210.0Inject null byte + Lua code into username field; server writes attacker Lua code to a session file at the now-known path; session load triggers execution as SYSTEM

Researcher Julien Ahrens documented the full chain in a June 2025 write-up, publishing a working proof-of-concept. Active exploitation began July 1, 2025 — just one day after publication.


Active Exploitation Details

Huntress confirmed real-world exploitation on a customer system, with attacks originating from multiple distinct IP addresses simultaneously. Post-exploitation behavior observed in the wild includes:

  • Immediate post-compromise reconnaissance
  • Creation of new local user accounts for persistence
  • Download and execution of malicious batch files
  • Deployment of ScreenConnect (remote monitoring tool) for persistent access

Wing FTP Server has over 10,000 customers worldwide, including US Air Force, Sony, Airbus, Reuters, and Sephora. Approximately 2,000+ internet-facing instances were identified at time of exploitation reports.


Remediation

Patching (Required)

Upgrade to Wing FTP Server v7.4.4 or later, which patches CVE-2025-47813, CVE-2025-47812, and CVE-2025-27889. The patch was released May 14, 2025.

If Patching Is Not Immediately Possible

Per CISA's BOD 22-01 guidance: if mitigations cannot be applied, discontinue use of Wing FTP Server until patching is feasible.

Federal Agencies

FCEB agencies must remediate by March 30, 2026 per CISA's KEV requirements.


Impact Assessment

Impact AreaDescription
Standalone riskLow — leaks only the installation path
Chained riskCritical — enables unauthenticated SYSTEM RCE via CVE-2025-47812
Exposure~2,000+ internet-facing Wing FTP instances; 10,000+ total customers
First exploitationJuly 1, 2025, one day after PoC publication
Sectors at riskAny organization using Wing FTP Server for managed file transfer
Persistence methods observedNew local accounts, ScreenConnect RAT deployment

Recommendations

For System Administrators

  1. Upgrade to Wing FTP Server v7.4.4 immediately — both CVEs are patched in this release
  2. Inventory all Wing FTP Server instances — include shadow IT deployments that may not appear in official asset lists
  3. Restrict internet-facing exposure — place Wing FTP behind a VPN or firewall if external access is not required
  4. Review recently created local accounts on Wing FTP hosts for signs of post-exploitation persistence

For Security Teams

  1. Hunt for ScreenConnect installations on Wing FTP Server hosts that weren't explicitly authorized
  2. Review Wing FTP authentication logs for unusual POST requests to /loginok.html with large cookie values
  3. Scan for CVE-2025-47812 and CVE-2025-47813 together — treat both as a single critical-priority remediation item
  4. Monitor for null byte patterns in Wing FTP authentication logs (%00 in username fields)

Key Takeaways

  1. CVE-2025-47813 is the recon step in a CVSS 10.0 kill chain — its Medium rating understates real-world risk when CVE-2025-47812 is also unpatched
  2. Exploitation began July 1, 2025 — organizations still running Wing FTP ≤ 7.4.3 have been at risk for months
  3. CISA's KEV addition on March 16, 2026 signals continued active exploitation 8+ months after initial disclosure
  4. The patch (v7.4.4) has been available since May 14, 2025 — any organization running an older version is operating a known-exploited system
  5. Post-exploitation includes ScreenConnect RAT deployment — treat any compromise as a full incident response event, not just a patching exercise

Sources

  • CISA Known Exploited Vulnerabilities Catalog
  • BleepingComputer — CISA flags Wing FTP Server flaw as actively exploited in attacks
  • RCE Security — CVE-2025-47813 Advisory (Julien Ahrens)
  • RCE Security — CVE-2025-47812: What the NULL?! Pre-Auth Wing FTP Server RCE
  • Huntress — Wing FTP Server RCE Exploited in the Wild
  • NVD — CVE-2025-47813
  • NVD — CVE-2025-47812
#Vulnerability#CVE#CISA KEV#Wing FTP Server#Information Disclosure#RCE Chain#FTP Server

Related Articles

CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability allowing a malicious app to cause unexpected changes in...

6 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read

CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

A critical unauthenticated information disclosure vulnerability in SiYuan, the personal knowledge management system, allows remote attackers to retrieve document IDs via the readDir API and then read the full content of any document. Patched in version 3.6.2.

4 min read
Back to all Security Alerts