By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Computing

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

News Room
Last updated: 2026/03/17 at 2:02 AM
News Room Published 17 March 2026
Share
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
SHARE

Ravie LakshmananMar 17, 2026Vulnerability / Network Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions.

“Wing FTP Server contains a generation of error messages containing sensitive information vulnerability when using a long value in the UID cookie,” CISA said.

The shortcoming affects all versions of the software prior to and including version 7.4.3. The issue was addressed in version 7.4.4, shipped in May following a responsible disclosure by RCE Security researcher Julien Ahrens.

It’s worth noting that version 7.4.4 also patches CVE-2025-47812 (CVSS score: 10.0), another critical bug in the same product that allows for remote code execution. As of July 2025, the vulnerability has come under active exploitation in the wild.

According to details shared by Huntress at the time, attackers have leveraged it to download and execute malicious Lua files, conduct reconnaissance, and install remote monitoring and management software.

Ahrens, in a proof-of-concept (PoC) exploit, shared on GitHub, noted that the endpoint at “/loginok.html” does not properly validate the value of the “UID” session cookie. As a result, if the supplied value is longer than the maximum path size of the underlying operating system, it triggers an error message that discloses the full local server path.

“Successful exploits can allow an authenticated attacker to get the local server path of the application, which can help in exploiting vulnerabilities like CVE-2025-47812,” the researcher added.

There are currently no details on how the vulnerability is being exploited in the wild, and if it’s being abused in conjunction with CVE-2025-47812. In light of the latest development, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary fixes by March 30, 2026.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nvidia Is Building a Computer for AI Data Centers in Space Nvidia Is Building a Computer for AI Data Centers in Space
Next Article QCon London 2026: Behind Booking.com’s AI Evolution: The Unpolished Story QCon London 2026: Behind Booking.com’s AI Evolution: The Unpolished Story
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Without appreciation there is no productivity | Computer Week
Without appreciation there is no productivity | Computer Week
News
After RAM, the price of processors risks increasing, and it’s still the fault of AI
After RAM, the price of processors risks increasing, and it’s still the fault of AI
Mobile
How the Psyche probe will join its asteroid while surfing on Mars
How the Psyche probe will join its asteroid while surfing on Mars
Computing
Doctors’ Day calls for a ban on social media up to the age of 16
Doctors’ Day calls for a ban on social media up to the age of 16
Software

You Might also Like

How the Psyche probe will join its asteroid while surfing on Mars
Computing

How the Psyche probe will join its asteroid while surfing on Mars

5 Min Read
A shortcut to Mars may have been found
Computing

A shortcut to Mars may have been found

2 Min Read
iPhone camera will offer a new level of customization with iOS 27
Computing

iPhone camera will offer a new level of customization with iOS 27

3 Min Read
POCO F8 Pro 5G (12 + 256 GB) at €386, Miyoo Mini Plus portable console at €46…
Computing

POCO F8 Pro 5G (12 + 256 GB) at €386, Miyoo Mini Plus portable console at €46…

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?