Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Monsta web-based FTP Remote Code Execution Vulnerability Exploited

Posted on November 10, 2025November 10, 2025 By CWS

A important distant code execution vulnerability in Monsta FTP, a well-liked web-based FTP shopper utilized by monetary establishments and enterprises worldwide.

The flaw, now tracked as CVE-2025-34299, impacts a number of variations of the software program and has been exploited within the wild.

Monsta FTP is a browser-based file switch shopper that permits customers to handle recordsdata on distant servers with out devoted FTP software program.

With a minimum of 5,000 cases uncovered on the web, the platform serves a various person base, together with monetary organizations and huge enterprises.

The Vulnerability and Patch Accessible

The safety flaw permits attackers to attain pre-authenticated distant code execution on susceptible Monsta FTP servers.

WatchTowr Labs researchers found that regardless of builders including intensive enter validation capabilities in latest updates, important vulnerabilities remained unpatched throughout a number of variations.

The assault works by means of a easy three-step course of: An attacker methods Monsta FTP into connecting to a malicious SFTP server. Downloads a crafted payload file.

Writes that file to an arbitrary path on the goal server. This grants full management over the susceptible system.

CVE IDVulnerability TypeAffected VersionStatusExploitationCVE-2025-34299Remote Code Execution (RCE)Monsta FTP ≤ 2.11.2Patched in v2.11.3 (Aug 26, 2025)Energetic exploitation within the wild

The vulnerability impacts variations 2.10.3 by means of 2.11, and researchers discovered that beforehand reported safety flaws have been by no means correctly fastened.

WatchTower Labs Evaluation revealed minimal code modifications between variations 2.10.3 and a couple of.10.4, leaving identified vulnerabilities intact with model updates.

Monsta FTP launched model 2.11.3 on August 26, 2025, which addresses this important vulnerability.

Organizations operating Monsta FTP ought to instantly improve to the newest model to guard their techniques.

The invention highlights ongoing safety challenges in web-based file administration techniques, significantly when legacy vulnerabilities persist regardless of a number of software program updates.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Execution, Exploited, FTP, Monsta, Remote, Vulnerability, WebBased

Post navigation

Previous Post: AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s
Next Post: Critical runc Vulnerabilities Put Docker and Kubernetes Container Isolation at Risk

Related Posts

New WhatsApp Scam Alert Tricks Users to Get Complete Access to Your WhatsApp Chats Cyber Security News
Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens Cyber Security News
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Cyber Security News
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Two New Web Application Risk Categories Added to OWASP Top 10
  • Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
  • Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
  • GlassWorm Malware Returns to Open VSX, Emerges on GitHub
  • Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret”

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Two New Web Application Risk Categories Added to OWASP Top 10
  • Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
  • Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
  • GlassWorm Malware Returns to Open VSX, Emerges on GitHub
  • Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret”

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News