CISA ADDS WING FTP TO LIST OF ACTIVELY EXPLOITED BUGS

The federal government is sounding a high-level alarm for businesses and agencies everywhere following a series of dangerous security holes discovered in Wing FTP Server. What started as a technical glitch has turned into a wide-open door for digital intruders. The Cybersecurity and Infrastructure Security Agency, better than known as CISA, has officially moved these flaws into their “must-fix” list because hackers are already using them to break into systems across the globe. If your organization relies on this software to move files, you are currently standing in the crosshairs of a global cyberattack.

A Small Leak Leading to a Massive Flood

At first glance, the vulnerability labeled as CVE-2025-47813 might not look like a deal-breaker. It is technically classified as a “medium” threat, but that label is incredibly deceiving. This specific bug involves a mistake in how the server handles cookies—those little bits of data that keep you logged in. When someone sends an unusually long “UID” cookie to the server, the system essentially trips over itself. Instead of simply rejecting the bad data, it spits out an error message that reveals the exact location of the software on the physical hard drive of the server.

You might wonder why a folder path matters. In the world of hacking, this is like a burglar finding a blueprint of your house that shows exactly where the safe is hidden. Security researcher Julien Ahrens, who first spotted the mess, warned that knowing this internal path is the “missing piece” hackers need to launch much more devastating attacks. By leaking this info, the server is basically handing over the keys to the kingdom.

The Nightmare Scenario: Remote Control

While the path leak is bad, the companion flaw—CVE-2025-47812—is a total catastrophe. This second bug carries a perfect “10 out of 10” severity score. When these two bugs are used together, the results are devastating. Hackers have figured out how to use the information from the first leak to trigger the second, allowing them to run their own malicious code on your computer from anywhere in the world.

Security experts at Huntress have been watching these attacks unfold in real-time. They’ve seen hackers using this “remote code execution” trick to drop malicious files written in a language called Lua. Once those files are running, the hackers have total control. They aren’t just stealing files; they are installing their own management tools so they can come and go as they please, spying on communications and digging deeper into the company network. It is a silent takeover that leaves the victim completely exposed.

The Clock is Ticking for Everyone

The software company did release a fix back in May with version 7.4.4, but the reality is that many people haven’t hit the “update” button yet. Because hackers are actively exploiting these holes right now, CISA has set a hard deadline. Federal agencies have until March 30, 2026, to get their systems patched, but private businesses should not wait that long. Every hour a server remains on version 7.4.3 or older is an hour that a hacker could be scanning your IP address.

To stay safe, you need to verify your version of Wing FTP immediately. If you are running anything older than 7.4.4, you are vulnerable. The fix is simple: update the software. However, the damage may already be done for some. If you find you’ve been running the old version, it is worth checking your logs for any strange activity or unauthorized files. In the world of cybersecurity, being a day late usually means being a dollar short—or in this case, a whole database short.

Privacy Preference Center