CVE-2025-47813

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to discover the complete installation path of the Wing FTP Server by manipulating a specific cookie value. To exploit this, the attacker needs to send a specially crafted request with a long UID cookie, which can help them plan further attacks on the server.

Technical Description

loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$552($500-$1K)
Vendor Response
Grade FPatched in 249 days

Quick Information

Published

Jul 10, 2025

9 months ago

Last Modified

Mar 16, 2026

22 days ago

Vendor

wftpserver

Product

wing ftp server