The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to federal civilian executive branch (FCEB) agencies, mandating the immediate patching of Wing FTP Server instances against a critical vulnerability. This flaw, tracked as CVE-2025-47813, is currently being exploited in the wild and poses a significant risk of enabling sophisticated remote code execution (RCE) attacks. The directive, issued on Tuesday, March 16, 2026, leverages the authority of Binding Operational Directive (BOD) 22-01, granting agencies a two-week window to remediate their systems. While the directive specifically targets federal entities, CISA strongly advises all organizations, including those in the private sector, to prioritize patching to defend against ongoing cyber threats.
Understanding the Vulnerability: CVE-2025-47813 and its Implications
CVE-2025-47813 resides within Wing FTP Server, a widely adopted cross-platform file transfer solution that supports standard FTP, secure SFTP, and web-based file transfer protocols. The software boasts an extensive customer base, with over 10,000 clients globally, including high-profile organizations such as the U.S. Air Force, Sony, Airbus, Reuters, and Sephora. This widespread adoption underscores the potential impact of a successful exploitation of the identified vulnerability.
According to CISA’s advisory, the security flaw allows a threat actor, even with low-privileged access, to discover the complete local installation path of the Wing FTP Server application on unpatched systems. This information disclosure is achieved through a vulnerability in the generation of error messages when a long value is supplied in the UID cookie. CISA explains that "Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie."
While the ability to discover the installation path might seem innocuous on its own, it serves as a critical stepping stone for more advanced attacks. In the hands of a malicious actor, this information can significantly streamline the process of launching more damaging exploits.
A Chain of Exploits: CVE-2025-47813 Linked to Remote Code Execution
The gravity of CVE-2025-47813 is amplified by its potential to be chained with other vulnerabilities, most notably CVE-2025-47812, a critical RCE flaw that was previously reported to be exploited in the wild. This suggests that an attacker could first leverage CVE-2025-47813 to gain crucial intelligence about the server’s configuration and then use that information to successfully execute arbitrary code on the compromised system via CVE-2025-47812.
The RCE vulnerability (CVE-2025-47812) gained notoriety in the cybersecurity community shortly after technical details became publicly available. Reports indicated that attackers began actively exploiting it within a day of the information’s release, highlighting the rapid pace at which threat actors can weaponize newly discovered vulnerabilities.
Adding to the severity, another information disclosure vulnerability, CVE-2025-27889, was also patched alongside these critical flaws. This vulnerability could be exploited to steal user passwords, further increasing the attack surface for compromised Wing FTP Server instances.
Timeline of Discovery and Remediation
The vulnerabilities in Wing FTP Server were discovered and reported by security researcher Julien Ahrens. Mr. Ahrens also provided proof-of-concept (PoC) exploit code for CVE-2025-47813 in June of the previous year, further demonstrating the exploitability of the flaw. His research explicitly mentioned the potential for attackers to use this vulnerability in conjunction with CVE-2025-47812 to achieve RCE.

The developers of Wing FTP Server responded to these findings by releasing a patch in May 2025 with the release of Wing FTP Server v7.4.4. This update addressed CVE-2025-47813, CVE-2025-47812 (RCE), and CVE-2025-27889 (information disclosure).
CISA’s inclusion of CVE-2025-47813 in its Known Exploited Vulnerabilities (KEV) catalog on March 16, 2026, signifies a formal recognition of its active exploitation and imminent threat to government systems. This addition triggers the mandatory remediation requirement under BOD 22-01 for FCEB agencies.
Binding Operational Directive 22-01: A Framework for Federal Cybersecurity
Binding Operational Directive 22-01, issued by CISA in November 2021, established a framework for federal agencies to manage cybersecurity risks associated with exploited vulnerabilities. The directive mandates that FCEB agencies identify and remediate all known exploited vulnerabilities on their networks within specific timeframes. The inclusion of CVE-2025-47813 in the KEV catalog means that agencies must take immediate action to secure their Wing FTP Server instances to comply with this directive.
The directive’s emphasis on timely patching is crucial. As CISA stated in its warning, "This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise." The agency’s proactive approach aims to prevent potential data breaches, service disruptions, and other cascading cyber incidents that could impact national security and critical infrastructure.
Broader Implications and Recommendations for the Private Sector
While BOD 22-01 is specifically directed at federal agencies, CISA’s advisory extends a critical message to the broader cybersecurity community. The agency strongly encourages all defenders, including those in the private sector, to assess their own Wing FTP Server deployments and implement the necessary patches without delay.
The interconnected nature of today’s digital landscape means that vulnerabilities exploited against government systems can, and often do, become targets for attacks against private sector organizations. The potential for attackers to leverage Wing FTP Server vulnerabilities for espionage, ransomware, or other malicious activities is a concern for businesses of all sizes that rely on secure file transfer protocols.
CISA’s recommendations for mitigating the risk are clear: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable." This advice underscores the importance of staying informed about vendor security advisories and promptly applying updates. For organizations that may not be able to immediately patch, exploring alternative secure file transfer solutions or implementing compensating controls should be a priority.
The ongoing exploitation of CVE-2025-47813 serves as a stark reminder of the persistent and evolving nature of cyber threats. The ability of threat actors to chain vulnerabilities, turning seemingly minor information disclosures into pathways for critical system compromise, highlights the need for a comprehensive and proactive cybersecurity strategy. Organizations must not only focus on patching known vulnerabilities but also on robust vulnerability management programs, threat intelligence gathering, and incident response readiness to effectively defend against sophisticated cyber adversaries. The swift action taken by CISA in adding this vulnerability to its KEV catalog and issuing a directive is a testament to the urgency of the situation and the agency’s commitment to safeguarding U.S. federal networks from immediate threats.







