CVE-2025-47812
CRITICALCVSS v3
10
CRITICAL
EPSS Score
92.8%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 7/10/2025
- Last Modified
- 11/5/2025
Frequently Asked Questions
What is CVE-2025-47812?
In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Is CVE-2025-47812 actively exploited?
Active exploitation of CVE-2025-47812 has not been confirmed. The EPSS score is 92.8%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-47812?
CVE-2025-47812 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-47812 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.