{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:46:35.020","vulnerabilities":[{"cve":{"id":"CVE-2025-27889","sourceIdentifier":"cve@mitre.org","published":"2025-07-10T17:15:46.683","lastModified":"2025-07-17T13:31:12.423","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker."},{"lang":"es","value":"Wing FTP Server anterior a la versión 7.4.4 no valida ni desinfecta correctamente el parámetro URL del endpoint downloadpass.html, lo que permite la inyección de un enlace arbitrario. Si un usuario hace clic en un enlace manipulado, se revela una contraseña en texto plano al atacante."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N","baseScore":3.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-15"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:*","versionEndExcluding":"7.4.4","matchCriteriaId":"34AF9E83-291C-40B0-AE69-34C9B59A5D03"}]}]}],"references":[{"url":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27889.txt","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wftpserver.com/wftpserver.htm","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}