Wing Ftp Server Wftpserver Wing Ftp Server

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Wftpserver Wing Ftp Server.

By the Year

In 2026 there have been 4 vulnerabilities in Wftpserver Wing Ftp Server with an average score of 7.0 out of ten. Last year, in 2025 Wing Ftp Server had 6 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Wing Ftp Server in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.72




Year Vulnerabilities Average Score
2026 4 6.97
2025 6 7.68
2024 0 0.00
2023 4 7.63
2022 0 0.00
2021 0 0.00
2020 3 0.00

It may take a day or so for new Wing Ftp Server vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Wftpserver Wing Ftp Server Security Vulnerabilities

Wing FTP Server <=6.2.6 CSRF deletes admin users via web admin
CVE-2020-37079 4.3 - Medium - February 06, 2026

Wing FTP Server versions prior to 6.2.7 contain a cross-site request forgery (CSRF) vulnerability in the web administration interface that allows attackers to delete admin users. Attackers can craft a malicious HTML page with a hidden form to submit a request that deletes the administrative user account without proper authorization.

Session Riding

Wing FTP Server 6.0.7 Unquoted Service Path (USP) Allows RCE
CVE-2019-25267 7.8 - High - February 04, 2026

Wing FTP Server 6.0.7 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the service configuration to inject malicious executables that will be launched with LocalSystem permissions.

Unquoted Search Path or Element

Remote Code Exec via Lua Console on Wing FTP Server 6.3.8
CVE-2020-37032 8.8 - High - January 30, 2026

Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function.

Shell injection

CVE-2022-50934
CVE-2022-50934 - January 13, 2026

PCMan FTP Server 2.0 Remote Buffer Overflow via cmd 'pwd'
CVE-2024-58299 9.8 - Critical - December 12, 2025

PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.

Stack Overflow

Wing FTP Server RCE via null byte injection before 7.4.4
CVE-2025-47812 10 - Critical - July 10, 2025

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

Improper Neutralization of Null Byte or NUL Character

Wing FTP Server <7.4.4 Arbitrary Link Injection Exposing Cleartext Pass
CVE-2025-27889 8.8 - High - July 10, 2025

Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker.

External Control of System or Configuration Setting

Wing FTP 7.4.4 Priv Esc via Admin Web Interface Root/SYS
CVE-2025-47811 6.6 - Medium - July 10, 2025

In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of the web interface are not necessarily also system administrators, one might argue that this is a privilege escalation. (If a privileged application role is not available to an attacker, CVE-2025-47812 can be leveraged.) NOTE: the vendor reportedly considers this behavior "fine to keep."

Privilege Defined With Unsafe Actions

Path Disclosure via Long UID Cookie in Wing FTP Server <=7.4.3
CVE-2025-47813 4.3 - Medium - July 10, 2025

loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.

Generation of Error Message Containing Sensitive Information

Wing FTP 7.4.3 Lua Admin Console Privilege Escalation CVE-2025-5196
CVE-2025-5196 6.6 - Medium - May 26, 2025

A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Lua Admin Console. The manipulation leads to execution with unnecessary privileges. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 7.4.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[W]e do not consider it as a security vulnerability, because the system admin in WingFTP has full permissions [...], but you can suggest the user run WingFTP service as Normal User rather than SYSTEM/Root, it will be safer."

Execution with Unnecessary Privileges

Wing FTP Server <=7.2.0 XSS via Improper Output Encoding
CVE-2023-37875 5.4 - Medium - September 12, 2023

Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.

XSS

Insecure Default Permissions in Wing FTP Server Admin Web Client (7.2.0)
CVE-2023-37878 8.8 - High - September 12, 2023

Insecure default permissions in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.

Incorrect Default Permissions

Wing FTP Server <=7.2.0 stores sensitive data insecurely (Web Client)
CVE-2023-37879 7.5 - High - September 12, 2023

Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.

Insecure Storage of Sensitive Information

Wing FTP Server <=7.2.0 Admin Web Client Privilege Escalation
CVE-2023-37881 8.8 - High - September 12, 2023

Weak access control in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.

AuthZ

An issue was discovered in Wing FTP Server 6.2.5 before February 2020
CVE-2020-9470 - March 07, 2020

An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel.

Wing FTP Server v6.2.3 for Linux
CVE-2020-8634 - March 07, 2020

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root.

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files
CVE-2020-8635 - March 07, 2020

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files. This allows local users to arbitrarily create FTP users with full privileges, and escalate privileges within the operating system by modifying system files.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Wftpserver Wing Ftp Server or by Wftpserver? Click the Watch button to subscribe.

Wftpserver
Vendor

subscribe