Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Identifies Exploited Wing FTP Vulnerability

CISA Identifies Exploited Wing FTP Vulnerability

Posted on March 17, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a medium-severity flaw in Wing FTP to its catalog of Known Exploited Vulnerabilities (KEV). This decision comes in response to evidence of ongoing exploitation of the vulnerability. Identified as CVE-2025-47813 and carrying a CVSS score of 4.3, this flaw involves the unintended exposure of installation paths under specific conditions.

Details of the Wing FTP Vulnerability

The vulnerability, as outlined by CISA, is triggered when a long value is input in the UID cookie, causing error messages that reveal sensitive information. This issue affects all software versions up to and including 7.4.3. The security loophole has been rectified in version 7.4.4, released in May, thanks to responsible disclosure by RCE Security researcher Julien Ahrens.

Additionally, version 7.4.4 addresses another critical vulnerability, CVE-2025-47812, which has a CVSS score of 10.0. This separate flaw allows for remote code execution and has been actively exploited since July 2025.

Exploitation and Patches

According to Huntress, attackers have utilized CVE-2025-47812 to execute malicious Lua files, perform reconnaissance, and install remote monitoring software. A proof-of-concept exploit, shared by Ahrens on GitHub, demonstrates that the endpoint at “/loginok.html” fails to properly validate the UID session cookie. If the provided value exceeds the operating system’s maximum path length, it results in an error message that discloses the local server path.

Such successful exploits can enable authenticated attackers to ascertain the local server path, potentially aiding in further exploitation of vulnerabilities like CVE-2025-47812.

Recommendations for Agencies

As of now, there is no detailed information on the exploitation methods being used in the wild, nor is it clear if this vulnerability is being exploited alongside CVE-2025-47812. In response to these developments, Federal Civilian Executive Branch (FCEB) agencies are advised to implement the necessary updates by March 30, 2026.

This proactive measure is crucial in mitigating potential risks associated with these vulnerabilities, underscoring the importance of timely software updates to safeguard network infrastructures.

The Hacker News Tags:CISA, CVE-2025-47813, Cybersecurity, FCEB agencies, information disclosure, network security, remote code execution, software patch, Vulnerability, Wing FTP

Post navigation

Previous Post: RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
Next Post: Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR

Related Posts

FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
Apple Tests Encrypted RCS Messaging in iOS Beta Apple Tests Encrypted RCS Messaging in iOS Beta The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
  • CISA Identifies Exploited Wing FTP Vulnerability
  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Unveil Vulnerability in Palo Alto’s Cortex XDR
  • CISA Identifies Exploited Wing FTP Vulnerability
  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News