Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Highlights Exploited Wing FTP Security Flaw

CISA Highlights Exploited Wing FTP Security Flaw

Posted on March 17, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the exploitation of a vulnerability in Wing FTP, a secure file transfer protocol server used across Windows, macOS, and Linux platforms. This flaw, identified over a year ago, poses significant risks if left unaddressed.

Understanding the Wing FTP Vulnerability

Wing FTP, a versatile FTP server, supports various file transfer protocols, allowing administrators remote management through a web interface. The vulnerability in question, tracked as CVE-2025-47813, is a medium-severity issue that can expose the full local installation path of the application. This occurs when an overly long value is input into the UID cookie during a logged-in session.

The flaw was originally disclosed on May 14, 2025, coinciding with the release of Wing FTP Server version 7.4.4, which included necessary patches. However, recent reports highlight that this vulnerability is actively exploited, prompting CISA to urge federal agencies to implement the patch by March 30.

Technical Details and Exploitation Risks

This security issue affects the loginok.html endpoint in Wing FTP, where inadequate validation of the UID cookie could allow attackers to retrieve the full installation path by inputting a value exceeding the system’s maximum path size. This was detailed by security expert Julien Ahrens of RCE Security, who also released a proof-of-concept demonstrating the flaw.

Ahrens warned that attackers might use this information to exploit further vulnerabilities within Wing FTP, such as CVE-2025-47812. This critical flaw, capable of enabling remote code execution, was patched simultaneously with CVE-2025-47813. June 2025 saw this vulnerability exploited, with Censys identifying approximately 5,000 servers at risk from POST request exploits.

Response and Preventive Measures

CISA’s inclusion of these vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog underscores the urgency for organizations to address these security gaps. The catalog serves as a resource for tracking high-profile vulnerabilities that require immediate attention. CISA’s call to action emphasizes the need for timely updates and patches to safeguard federal systems.

Looking forward, organizations are encouraged to remain vigilant and proactive in applying software updates. By doing so, they can mitigate potential threats and ensure robust cybersecurity defenses. The ongoing evolution of cyber threats necessitates a dynamic response strategy to protect critical infrastructure.

Related security news highlights similar vulnerabilities, including issues with N8n, Slopoly malware, and recent updates to Chrome and Ivanti Endpoint Manager, reflecting the broader landscape of cybersecurity challenges.

Security Week News Tags:CISA, CVE-2025-47812, CVE-2025-47813, cyber threat, Cybersecurity, Exploit, federal agencies, KEV catalog, Patch, remote code execution, Security, software update, Vulnerability, Wing FTP

Post navigation

Previous Post: AI Security Lags Behind as Skills Fail to Evolve
Next Post: Phishing Tactics Exploit Safe Links with Complex URL Rewrites

Related Posts

Mycroft Raises .5 Million for AI-Powered Security and Compliance Platform Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform Security Week News
Cybersecurity Updates: ATT&CK Council, Russian Cyber Tactics, iOS Vulnerabilities Cybersecurity Updates: ATT&CK Council, Russian Cyber Tactics, iOS Vulnerabilities Security Week News
VMScape: Academics Break Cloud Isolation With New Spectre Attack VMScape: Academics Break Cloud Isolation With New Spectre Attack Security Week News
Cylake Secures M Funding for On-Premises Cybersecurity Cylake Secures $45M Funding for On-Premises Cybersecurity Security Week News
Ransomware Group Claims Attack on Beer Giant Asahi Ransomware Group Claims Attack on Beer Giant Asahi Security Week News
Hirundo Raises  Million to Eliminate AI’s Bad Behavior Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News