wftpserver CVE Vulnerabilities & Metrics

Focus on wftpserver vulnerabilities and metrics.

Last updated: 08 Jul 2025, 22:25 UTC

About wftpserver Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with wftpserver. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total wftpserver CVEs: 10
Earliest CVE date: 19 Dec 2008, 01:52 UTC
Latest CVE date: 26 May 2025, 14:15 UTC

Latest CVE reference: CVE-2025-5196

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): -75.0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): -75.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical wftpserver CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.49

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 6
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS wftpserver CVEs

These are the five CVEs with the highest CVSS scores for wftpserver, sorted by severity first and recency.

All CVEs for wftpserver

CVE-2025-5196 wftpserver vulnerability CVSS: 6.8 26 May 2025, 14:15 UTC

A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Lua Admin Console. The manipulation leads to execution with unnecessary privileges. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 7.4.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[W]e do not consider it as a security vulnerability, because the system admin in WingFTP has full permissions [...], but you can suggest the user run WingFTP service as Normal User rather than SYSTEM/Root, it will be safer."

CVE-2023-37881 wftpserver vulnerability CVSS: 0 12 Sep 2023, 09:15 UTC

Weak access control in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.

CVE-2023-37879 wftpserver vulnerability CVSS: 0 12 Sep 2023, 09:15 UTC

Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.

CVE-2023-37878 wftpserver vulnerability CVSS: 0 12 Sep 2023, 09:15 UTC

Insecure default permissions in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.

CVE-2023-37875 wftpserver vulnerability CVSS: 0 12 Sep 2023, 09:15 UTC

Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.

CVE-2020-27735 wftpserver vulnerability CVSS: 4.3 26 Jan 2021, 18:15 UTC

An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser.

CVE-2020-9470 wftpserver vulnerability CVSS: 6.9 07 Mar 2020, 01:15 UTC

An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel.

CVE-2020-8635 wftpserver vulnerability CVSS: 7.2 07 Mar 2020, 00:15 UTC

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files. This allows local users to arbitrarily create FTP users with full privileges, and escalate privileges within the operating system by modifying system files.

CVE-2020-8634 wftpserver vulnerability CVSS: 7.2 07 Mar 2020, 00:15 UTC

Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root.

CVE-2015-4108 wftpserver vulnerability CVSS: 6.8 10 Jun 2015, 18:59 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in Wing FTP Server before 4.4.7 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code via a crafted request to admin_lua_script.html or (2) add a domain administrator via a crafted request to admin_addadmin.html.

CVE-2012-4729 wftpserver vulnerability CVSS: 6.8 26 Oct 2012, 10:39 UTC

Wing FTP Server before 4.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via two zip commands.

CVE-2010-2428 wftpserver vulnerability CVSS: 4.3 24 Jun 2010, 12:17 UTC

Cross-site scripting (XSS) vulnerability in admin_loginok.html in the Administrator web interface in Wing FTP Server for Windows 3.5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted POST request.

CVE-2009-0351 wftpserver vulnerability CVSS: 9.0 29 Jan 2009, 19:30 UTC

Stack-based buffer overflow in WFTPSRV.exe in WinFTP 2.3.0 allows remote authenticated users to execute arbitrary code via a long LIST argument beginning with an * (asterisk) character.

CVE-2008-5666 wftpserver vulnerability CVSS: 3.5 19 Dec 2008, 01:52 UTC

WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.