We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47811



Description

In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of the web interface are not necessarily also system administrators, one might argue that this is a privilege escalation. (If a privileged application role is not available to an attacker, CVE-2025-47812 can be leveraged.) NOTE: the vendor reportedly considers this behavior "fine to keep."

Reserved 2025-05-10 | Published 2025-07-10 | Updated 2025-07-10 | Assigner mitre


MEDIUM: 4.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-267 Privilege Defined With Unsafe Actions

Product status

Default status
unaffected

Any version
affected

References

www.wftpserver.com

www.rcesecurity.com/...l-wing-ftp-server-rce-cve-2025-47812/

cve.org (CVE-2025-47811)

nvd.nist.gov (CVE-2025-47811)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47811

Support options

Helpdesk Chat, Email, Knowledgebase