Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Monsta web-based FTP Remote Code Execution Vulnerability Exploited

Posted on November 10, 2025November 10, 2025 By CWS

A important distant code execution vulnerability in Monsta FTP, a well-liked web-based FTP shopper utilized by monetary establishments and enterprises worldwide.

The flaw, now tracked as CVE-2025-34299, impacts a number of variations of the software program and has been exploited within the wild.

Monsta FTP is a browser-based file switch shopper that permits customers to handle recordsdata on distant servers with out devoted FTP software program.

With a minimum of 5,000 cases uncovered on the web, the platform serves a various person base, together with monetary organizations and huge enterprises.

The Vulnerability and Patch Accessible

The safety flaw permits attackers to attain pre-authenticated distant code execution on susceptible Monsta FTP servers.

WatchTowr Labs researchers found that regardless of builders including intensive enter validation capabilities in latest updates, important vulnerabilities remained unpatched throughout a number of variations.

The assault works by means of a easy three-step course of: An attacker methods Monsta FTP into connecting to a malicious SFTP server. Downloads a crafted payload file.

Writes that file to an arbitrary path on the goal server. This grants full management over the susceptible system.

CVE IDVulnerability TypeAffected VersionStatusExploitationCVE-2025-34299Remote Code Execution (RCE)Monsta FTP ≤ 2.11.2Patched in v2.11.3 (Aug 26, 2025)Energetic exploitation within the wild

The vulnerability impacts variations 2.10.3 by means of 2.11, and researchers discovered that beforehand reported safety flaws have been by no means correctly fastened.

WatchTower Labs Evaluation revealed minimal code modifications between variations 2.10.3 and a couple of.10.4, leaving identified vulnerabilities intact with model updates.

Monsta FTP launched model 2.11.3 on August 26, 2025, which addresses this important vulnerability.

Organizations operating Monsta FTP ought to instantly improve to the newest model to guard their techniques.

The invention highlights ongoing safety challenges in web-based file administration techniques, significantly when legacy vulnerabilities persist regardless of a number of software program updates.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Code, Execution, Exploited, FTP, Monsta, Remote, Vulnerability, WebBased

Post navigation

Previous Post: AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s
Next Post: Critical runc Vulnerabilities Put Docker and Kubernetes Container Isolation at Risk

Related Posts

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor Cyber Security News
New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps Cyber Security News
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News
Microsoft Investigation Teams text-to-speech Functionality Issue Impacting Users Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
  • Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site
  • Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data
  • QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland
  • Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
  • Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site
  • Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data
  • QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland
  • Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News