Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
    Cybersecurity

    CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

    adminBy adminMarch 17, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 17, 2026Vulnerability / Network Security

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

    The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions.

    “Wing FTP Server contains a generation of error messages containing sensitive information vulnerability when using a long value in the UID cookie,” CISA said.

    The shortcoming affects all versions of the software prior to and including version 7.4.3. The issue was addressed in version 7.4.4, shipped in May following a responsible disclosure by RCE Security researcher Julien Ahrens.

    It’s worth noting that version 7.4.4 also patches CVE-2025-47812 (CVSS score: 10.0), another critical bug in the same product that allows for remote code execution. As of July 2025, the vulnerability has come under active exploitation in the wild.

    According to details shared by Huntress at the time, attackers have leveraged it to download and execute malicious Lua files, conduct reconnaissance, and install remote monitoring and management software.

    Ahrens, in a proof-of-concept (PoC) exploit, shared on GitHub, noted that the endpoint at “/loginok.html” does not properly validate the value of the “UID” session cookie. As a result, if the supplied value is longer than the maximum path size of the underlying operating system, it triggers an error message that discloses the full local server path.

    “Successful exploits can allow an authenticated attacker to get the local server path of the application, which can help in exploiting vulnerabilities like CVE-2025-47812,” the researcher added.

    There are currently no details on how the vulnerability is being exploited in the wild, and if it’s being abused in conjunction with CVE-2025-47812. In light of the latest development, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary fixes by March 30, 2026.

    Actively CISA Exploited flags FTP leaking Paths Server vulnerability Wing
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleTrust Is The New Ranking Factor
    Next Article War in Middle East raises concerns about physical data center security
    admin
    • Website

    Related Posts

    Threat Actor Targeting VPN Users in New Credential Theft Campaign

    March 17, 2026

    What to do in the first 24 hours of a breach

    March 17, 2026

    Stryker attack raises concerns about role of device management tool

    March 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Don’t pay a fortune to expand your screen real estate when this dual-screen portable monitor is just $200

    March 17, 2026

    Threat Actor Targeting VPN Users in New Credential Theft Campaign

    March 17, 2026

    LinkedIn updates feed algorithm with LLM-powered ranking and retrieval

    March 17, 2026

    Google Calendar gets a huge upgrade that tackles time zones

    March 17, 2026
    Categories
    • Blogging (41)
    • Cybersecurity (814)
    • Privacy & Online Earning (123)
    • SEO & Digital Marketing (500)
    • Tech Tools & Mobile / Apps (999)
    • WiFi / Internet & Networking (133)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Don’t pay a fortune to expand your screen real estate when this dual-screen portable monitor is just $200

    March 17, 2026

    Threat Actor Targeting VPN Users in New Credential Theft Campaign

    March 17, 2026

    LinkedIn updates feed algorithm with LLM-powered ranking and retrieval

    March 17, 2026
    Most Popular
    • Don’t pay a fortune to expand your screen real estate when this dual-screen portable monitor is just $200
    • Threat Actor Targeting VPN Users in New Credential Theft Campaign
    • LinkedIn updates feed algorithm with LLM-powered ranking and retrieval
    • Google Calendar gets a huge upgrade that tackles time zones
    • Google’s latest system update for Android is small, but surprisingly useful
    • War in Middle East raises concerns about physical data center security
    • CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
    • Trust Is The New Ranking Factor
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.