CVE-2025-47813
Published: 10 July 2025
Summary
CVE-2025-47813 is a medium-severity Generation of Error Message Containing Sensitive Information (CWE-209) vulnerability in Wftpserver Wing Ftp Server. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique File and Directory Discovery (T1083); ranked in the top 3.6% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-11 ensures error handling prevents uncontrolled leaks of sensitive information like installation paths triggered by malformed long UID cookies.
SI-10 validates inputs such as excessively long UID cookies to block exploitation attempts before processing.
SI-15 filters sensitive information like server paths from HTML outputs generated by loginok.html.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-47813 discloses the application's local installation path via long UID cookie, enabling File and Directory Discovery (T1083). The advisory describes a related pre-auth NULL byte authentication bypass in the same component leading to RCE, facilitating Exploitation of Public-Facing Application (T1190).
NVD Description
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
Deeper analysisAI
CVE-2025-47813 is an information disclosure vulnerability (CWE-209) affecting the loginok.html component in Wing FTP Server versions prior to 7.4.4. When a long value is supplied in the UID cookie, the application exposes its full local installation path. Published on 2025-07-10, the vulnerability carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N), indicating moderate severity primarily due to limited confidentiality impact.
An authenticated attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). By sending a specially crafted request to loginok.html containing an excessively long UID cookie value, the attacker retrieves the server's complete installation path, enabling reconnaissance that could facilitate further attacks such as path traversal or privilege escalation when chained with other flaws.
Mitigation involves upgrading to Wing FTP Server 7.4.4 or later, as indicated by the affected version range in the CVE description. Vendor guidance is available at wftpserver.com, with additional details in advisories like the GitHub entry from MrTuxracer.
This CVE appears in the CISA Known Exploited Vulnerabilities Catalog and relates to other Wing FTP Server issues, including CVE-2025-47812 (an RCE), as covered by RCEsecurity.
Details
- CWE(s)
- KEV Date Added
- 16 March 2026