CVE-2025-47812
Wing FTP Server vulnerability analysis and mitigation

Overview

CVE-2025-47812 is a critical remote code execution vulnerability affecting Wing FTP Server versions before 7.4.4. The vulnerability was discovered in June 2025 and publicly disclosed on June 30, 2025. The flaw exists in both the user and admin web interfaces where they improperly handle null ('\0') bytes, allowing injection of arbitrary Lua code into user session files. This vulnerability can be exploited to execute arbitrary system commands with root or SYSTEM privileges, which are the default service permissions (RCE Security, Hacker News).

Technical details

The vulnerability stems from how null bytes are handled in the username parameter, specifically related to the loginok.html file that handles the authentication process. The flaw occurs when the application's c_CheckUser() function processes the username using strlen(), which only counts characters until it reaches the NULL-byte terminator. This allows attackers to bypass authentication checks and inject arbitrary Lua code that gets executed when the session file is loaded. The vulnerability has received a CVSS v3.1 score of 10.0 (Critical), indicating the highest possible severity (NVD, RCE Security).

Impact

The vulnerability allows attackers to execute arbitrary system commands with the privileges of the FTP service, which runs as root on Linux systems and SYSTEM on Windows by default. According to Censys data, there are 8,103 publicly-accessible devices running Wing FTP Server, with 5,004 having their web interface exposed. The majority of affected instances are located in the U.S., China, Germany, the U.K., and India (Hacker News).

Mitigation and workarounds

Organizations are strongly advised to upgrade to Wing FTP Server version 7.4.4 or later, which contains the fix for this vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-47812 to its Known Exploited Vulnerabilities (KEV) Catalog, requiring Federal Civilian Executive Branch agencies to apply the fixes by August 4, 2025 (Hacker News).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management