Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-47813 β€” AI Deep Analysis Summary

CVSS 4.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: `loginok.html` leaks the local installation path via an error message. πŸ’₯ **Consequences**: Information Disclosure (CWE-209).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper validation of the `UID` session cookie. πŸ” **Flaw**: Supplying an overlong `UID` value triggers a server error that exposes the full local filesystem path.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: Wing FTP Server. πŸ“‰ **Versions**: All versions **prior to 7.4.4**. 🏒 **Vendor**: wftpserver.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Disclose the local file system path. 🧩 **Impact**: This info aids in chaining attacks (e.g., CVE-2025-47812). It does NOT directly grant RCE but enables it.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: Medium. πŸ“ **Auth**: Requires **Authentication** (PR:L). 🌐 **Access**: Network accessible (AV:N). 🚫 **UI**: No user interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: Yes. πŸ§ͺ **PoC**: Available via Nuclei templates (projectdiscovery). πŸ”— **Link**: `http/cves/2025/CVE-2025-47813.yaml`. 🌍 **Wild Exp**: Low complexity, but auth required.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Send a malformed/overlong `UID` cookie to `/loginok.html`. πŸ‘€ **Indicator**: Look for error responses containing the full local filesystem path.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fixed**: Yes. βœ… **Patch**: Upgrade to **Wing FTP Server 7.4.4** or later. πŸ“… **Published**: 2025-07-10.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Restrict access to `/loginok.html`. πŸ”’ **Mitigation**: Ensure strict input validation for `UID` cookies. πŸ›‘ **Block**: Limit network exposure if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: High Priority. πŸ“ˆ **CVSS**: 5.3 (Medium). ⚑ **Reason**: Authenticated info disclosure is a stepping stone to RCE. Patch immediately to prevent chaining attacks.