PatchSiren cyber security CVE debrief
CVE-2025-47813 Wing FTP Server CVE debrief
CVE-2025-47813 is an information disclosure vulnerability affecting Wing FTP Server and has been added to CISA’s Known Exploited Vulnerabilities catalog. For defenders, the key point is not just the CVE itself, but the KEV status: CISA lists it with a required remediation window ending 2026-03-30. If your environment uses Wing FTP Server, prioritize vendor guidance, validate whether mitigations are available, and plan removal or replacement if they are not.
- Vendor
- Wing FTP Server
- Product
- Wing FTP Server
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2026-03-16
- Original CVE updated
- 2026-03-16
- Advisory published
- 2026-03-16
- Advisory updated
- 2026-03-16
Who should care
Organizations running Wing FTP Server, especially internet-facing instances; IT and security teams responsible for file transfer services; managed service providers supporting customers that use Wing FTP Server.
Technical summary
The supplied corpus identifies CVE-2025-47813 only as a Wing FTP Server information disclosure vulnerability. No CVSS score or detailed flaw mechanics were provided in the source set. What is confirmed is that CISA marked it as a known exploited vulnerability on 2026-03-16 and associated it with remediation guidance from the vendor and the KEV response timeline.
Defensive priority
High. The CISA KEV listing means this issue should be treated as urgent for exposure review, mitigation, and remediation planning, especially before the 2026-03-30 due date.
Recommended defensive actions
- Check whether Wing FTP Server is deployed anywhere in your environment, including externally hosted or customer-managed instances.
- Review vendor remediation guidance for CVE-2025-47813 and apply it as soon as possible.
- If mitigations are unavailable, follow CISA’s guidance to discontinue use of the product or service.
- Prioritize internet-facing or broadly reachable Wing FTP Server installations for validation and remediation.
- Confirm the issue is remediated before the KEV due date of 2026-03-30.
- Monitor for any vendor updates or revised guidance tied to CVE-2025-47813.
Evidence notes
The source corpus confirms the CVE title, the vulnerability type (information disclosure), and CISA KEV metadata including dateAdded 2026-03-16 and dueDate 2026-03-30. The corpus also references the official CVE record and NVD entry, but it does not include a CVSS score or detailed technical write-up from the vendor advisory text.
Official resources
-
CVE-2025-47813 CVE record
CVE.org
-
CVE-2025-47813 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed on 2026-03-16 in the CVE and CISA KEV records supplied here; the source corpus does not include a detailed vendor advisory excerpt.