Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Identifies Exploited Wing FTP Vulnerability

CISA Identifies Exploited Wing FTP Vulnerability

Posted on March 17, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a medium-severity flaw in Wing FTP to its catalog of Known Exploited Vulnerabilities (KEV). This decision comes in response to evidence of ongoing exploitation of the vulnerability. Identified as CVE-2025-47813 and carrying a CVSS score of 4.3, this flaw involves the unintended exposure of installation paths under specific conditions.

Details of the Wing FTP Vulnerability

The vulnerability, as outlined by CISA, is triggered when a long value is input in the UID cookie, causing error messages that reveal sensitive information. This issue affects all software versions up to and including 7.4.3. The security loophole has been rectified in version 7.4.4, released in May, thanks to responsible disclosure by RCE Security researcher Julien Ahrens.

Additionally, version 7.4.4 addresses another critical vulnerability, CVE-2025-47812, which has a CVSS score of 10.0. This separate flaw allows for remote code execution and has been actively exploited since July 2025.

Exploitation and Patches

According to Huntress, attackers have utilized CVE-2025-47812 to execute malicious Lua files, perform reconnaissance, and install remote monitoring software. A proof-of-concept exploit, shared by Ahrens on GitHub, demonstrates that the endpoint at “/loginok.html” fails to properly validate the UID session cookie. If the provided value exceeds the operating system’s maximum path length, it results in an error message that discloses the local server path.

Such successful exploits can enable authenticated attackers to ascertain the local server path, potentially aiding in further exploitation of vulnerabilities like CVE-2025-47812.

Recommendations for Agencies

As of now, there is no detailed information on the exploitation methods being used in the wild, nor is it clear if this vulnerability is being exploited alongside CVE-2025-47812. In response to these developments, Federal Civilian Executive Branch (FCEB) agencies are advised to implement the necessary updates by March 30, 2026.

This proactive measure is crucial in mitigating potential risks associated with these vulnerabilities, underscoring the importance of timely software updates to safeguard network infrastructures.

The Hacker News Tags:CISA, CVE-2025-47813, Cybersecurity, FCEB agencies, information disclosure, network security, remote code execution, software patch, Vulnerability, Wing FTP

Post navigation

Previous Post: RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
Next Post: Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR

Related Posts

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware The Hacker News
Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More The Hacker News
Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety The Hacker News
Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More The Hacker News
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Chrome 0-Day Flaws Demand Immediate Action
  • Phishing Scams Exploit LiveChat to Extract User Data
  • Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
  • CISA Identifies Exploited Wing FTP Vulnerability
  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Chrome 0-Day Flaws Demand Immediate Action
  • Phishing Scams Exploit LiveChat to Extract User Data
  • Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
  • CISA Identifies Exploited Wing FTP Vulnerability
  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News