What happened
CISA added CVE-2025-47813 (Wing FTP Server information disclosure vulnerability) to its Known Exploited Vulnerabilities (KEV) catalog.
A KEV listing means defenders should treat this as active attacker tradecraft, not a theoretical issue.
Why this matters
Wing FTP is often internet-facing or reachable from partner networks. Information disclosure flaws can provide attackers with sensitive server data that accelerates follow-on compromise.
For organizations running exposed file transfer infrastructure, KEV additions usually compress patch timelines.
What defenders should do now
- Inventory all Wing FTP instances (including legacy and shadow IT deployments).
- Patch/remediate CVE-2025-47813 according to vendor guidance.
- Restrict management interfaces to trusted networks only.
- Hunt logs for unusual probing, path disclosure attempts, and suspicious auth behavior.
- Add temporary compensating controls (WAF/access restrictions) where patch windows are delayed.
Bottom line
When CISA adds a CVE to KEV, speed matters. If Wing FTP is in your environment, prioritize remediation as an active-risk event.
