Multiple vulnerabilities in Wing FTP Server



| Updated: 2025-07-07
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-47812
CWE-ID CWE-20
CWE-200
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
Wing FTP Server
Server applications / File servers (FTP/HTTP)

Vendor Wing FTP Server

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU112272

Risk: Medium

CVSSv4.0: 8.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]

CVE-ID: CVE-2025-47812

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote authenticated user can perform certain actions and execute arbitrary code with elevated privileges. 

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Wing FTP Server: 3.0.0 - 7.4.3

CPE2.3 External links

https://www.wftpserver.com/serverhistory.htm


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

2) Information disclosure

EUVDB-ID: #VU112273

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: N/A

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to full path disclosure via an overlong UID string. A remote user can send specially crafted input to the server and gain access to sensitive information. 

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Wing FTP Server: 3.0.0 - 7.4.3

CPE2.3 External links

https://www.wftpserver.com/serverhistory.htm


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###