CVE-2025-47813
Medium
|4.3Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to discover the complete installation path of the Wing FTP Server by manipulating a specific cookie value. To exploit this, the attacker needs to send a specially crafted request with a long UID cookie, which can help them plan further attacks on the server.
Technical Description
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$552($500-$1K)
Vendor Response
Grade FPatched in 249 days
Quick Information
Published
Jul 10, 2025
9 months ago
Last Modified
Mar 16, 2026
22 days ago
Vendor
wftpserver
Product
wing ftp server