CVE-2020-8635
Wing FTP Server vulnerability analysis and mitigation

Overview

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris contains a vulnerability related to insecure permissions on installation directories and configuration files. The vulnerability, identified as CVE-2020-8635, was discovered and disclosed in March 2020. This security flaw affects the server software that supports multiple file transfer protocols including FTP, FTPS, HTTP, HTTPS, and SFTP (Hooper Labs).

Technical details

The vulnerability stems from Wing FTP Server setting unsafe default permissions on sensitive configuration files. Specifically, user configuration files stored in $WINGFTP_DIR/Data/users/.xml are created with world-readable and world-writable permissions. Additionally, the users directory is created with full global permissions (777), allowing any system user to write to it. This insecure configuration enables unauthorized users to view existing user credentials and their MD5 password hashes, as well as forge new user accounts within the application (Hooper Labs).

Impact

The vulnerability allows any local user to potentially escalate privileges to root on affected systems. Attackers can view existing user credentials, modify user information, perform account takeover, and potentially gain unauthorized administrative access to the FTP server. The combination of world-readable and world-writable permissions on sensitive files creates a significant security risk that could lead to complete system compromise (Hooper Labs).

Mitigation and workarounds

Users should ensure proper file permissions are set on installation directories and configuration files. Critical configuration files should have restricted permissions that prevent unauthorized access and modification. Additionally, users should upgrade to a patched version of Wing FTP Server if available (Hooper Labs).

Additional resources


SourceThis report was generated using AI

Related Wing FTP Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-47812CRITICAL10
  • Wing FTP ServerWing FTP Server
  • cpe:2.3:a:wftpserver:wing_ftp_server
YesYesJul 10, 2025
CVE-2025-27889HIGH8.8
  • Wing FTP ServerWing FTP Server
  • cpe:2.3:a:wftpserver:wing_ftp_server
NoYesJul 10, 2025
CVE-2025-47811MEDIUM6.6
  • Wing FTP ServerWing FTP Server
  • cpe:2.3:a:wftpserver:wing_ftp_server
NoYesJul 10, 2025
CVE-2025-47813MEDIUM4.3
  • Wing FTP ServerWing FTP Server
  • cpe:2.3:a:wftpserver:wing_ftp_server
NoYesJul 10, 2025
CVE-2022-50934N/AN/A
  • Wing FTP ServerWing FTP Server
  • cpe:2.3:a:wftpserver:wing_ftp_server
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management