CVE-2025-47812

CRITICAL

CVSS v3

10

CRITICAL

EPSS Score

92.8%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

Technical Details

CVSS v3 Vector
3.1
Published
7/10/2025
Last Modified
11/5/2025

Frequently Asked Questions

What is CVE-2025-47812?

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

Is CVE-2025-47812 actively exploited?

Active exploitation of CVE-2025-47812 has not been confirmed. The EPSS score is 92.8%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-47812?

CVE-2025-47812 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-47812 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.