By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Computing

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

News Room
Last updated: 2026/03/17 at 2:02 AM
News Room Published 17 March 2026
Share
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
SHARE

Ravie LakshmananMar 17, 2026Vulnerability / Network Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions.

“Wing FTP Server contains a generation of error messages containing sensitive information vulnerability when using a long value in the UID cookie,” CISA said.

The shortcoming affects all versions of the software prior to and including version 7.4.3. The issue was addressed in version 7.4.4, shipped in May following a responsible disclosure by RCE Security researcher Julien Ahrens.

It’s worth noting that version 7.4.4 also patches CVE-2025-47812 (CVSS score: 10.0), another critical bug in the same product that allows for remote code execution. As of July 2025, the vulnerability has come under active exploitation in the wild.

According to details shared by Huntress at the time, attackers have leveraged it to download and execute malicious Lua files, conduct reconnaissance, and install remote monitoring and management software.

Ahrens, in a proof-of-concept (PoC) exploit, shared on GitHub, noted that the endpoint at “/loginok.html” does not properly validate the value of the “UID” session cookie. As a result, if the supplied value is longer than the maximum path size of the underlying operating system, it triggers an error message that discloses the full local server path.

“Successful exploits can allow an authenticated attacker to get the local server path of the application, which can help in exploiting vulnerabilities like CVE-2025-47812,” the researcher added.

There are currently no details on how the vulnerability is being exploited in the wild, and if it’s being abused in conjunction with CVE-2025-47812. In light of the latest development, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary fixes by March 30, 2026.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nvidia Is Building a Computer for AI Data Centers in Space Nvidia Is Building a Computer for AI Data Centers in Space
Next Article QCon London 2026: Behind Booking.com’s AI Evolution: The Unpolished Story QCon London 2026: Behind Booking.com’s AI Evolution: The Unpolished Story
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

UK must learn lessons from AI race and retain its quantum computing talent, says minister
UK must learn lessons from AI race and retain its quantum computing talent, says minister
News
ARM NEON Accelerated CRC64 Optimization Shows Nearly 6x Improvement
ARM NEON Accelerated CRC64 Optimization Shows Nearly 6x Improvement
Computing
These are my 7 favorite Android weather apps that I think you’ll love too
These are my 7 favorite Android weather apps that I think you’ll love too
News
AI unicorn Zhipu raises 2 million in new funding round · TechNode
AI unicorn Zhipu raises $412 million in new funding round · TechNode
Computing

You Might also Like

ARM NEON Accelerated CRC64 Optimization Shows Nearly 6x Improvement
Computing

ARM NEON Accelerated CRC64 Optimization Shows Nearly 6x Improvement

2 Min Read
AI unicorn Zhipu raises 2 million in new funding round · TechNode
Computing

AI unicorn Zhipu raises $412 million in new funding round · TechNode

2 Min Read
Google Pixel 10 to ditch Qualcomm and Samsung modems in favor of MediaTek in 2025: report · TechNode
Computing

Google Pixel 10 to ditch Qualcomm and Samsung modems in favor of MediaTek in 2025: report · TechNode

1 Min Read
China’s CATL aims to boost tech innovation by funding suppliers · TechNode
Computing

China’s CATL aims to boost tech innovation by funding suppliers · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?