Wing FTP Server 8.1.2 Authenticated Remote Code Execution via Session Serialization (CVE-2026-44403)
Wing FTP Server 8.1.2 contains an authenticated remote code execution vulnerability (CVE-2026-44403) in the session serialization mechanism, allowing administrators to inject arbitrary Lua code and achieve remote code execution.
Wing FTP Server 8.1.2 is vulnerable to authenticated remote code execution (CVE-2026-44403) due to unsafe session serialization. An authenticated administrator can inject arbitrary Lua code through the mydirectory field within the domain admin settings. This vulnerability stems from the server’s failure to properly escape closing delimiters when serializing session values into Lua source code. Successful exploitation allows attackers to execute arbitrary code on the server when the poisoned session is loaded using the loadfile() function. This is a high-severity vulnerability as it allows for complete compromise of the affected server.
Attack Chain
- The attacker authenticates to the Wing FTP Server as an administrator.
- The attacker navigates to the domain admin settings.
- The attacker modifies the
mydirectoryfield with a malicious Lua payload containing code injection. - The server serializes the session data, including the injected Lua code, into a session file without proper sanitization.
- The server saves the modified session data.
- The server loads the session file, using the
loadfile()function to interpret the session data as Lua code. - The injected Lua code is executed due to the insecure deserialization process.
- The attacker achieves remote code execution on the server.
Impact
Successful exploitation of this vulnerability (CVE-2026-44403) grants the attacker the ability to execute arbitrary code on the Wing FTP Server. This can lead to complete compromise of the server, including data theft, modification, or destruction. Given that FTP servers are often used to store sensitive data, this vulnerability poses a significant risk to data confidentiality and integrity. There is no information about the number of victims, but any organization using Wing FTP Server 8.1.2 with admin accounts exposed is at risk.
Recommendation
- Upgrade to a patched version of Wing FTP Server that addresses CVE-2026-44403.
- Deploy the Sigma rule
Detect Wing FTP Server CVE-2026-44403 RCE Attemptto detect attempts to exploit this vulnerability. - Monitor Wing FTP Server logs for suspicious activity related to session management and Lua code execution using the
Detect Wing FTP Server Suspicious Lua Loadrule.
Detection coverage 2
Detect Wing FTP Server CVE-2026-44403 RCE Attempt
highDetects CVE-2026-44403 exploitation attempt — attempts to inject malicious Lua code into the domain admin mydirectory field.
Detect Wing FTP Server Suspicious Lua Load
mediumDetects suspicious Lua loading activity potentially related to CVE-2026-44403 exploitation.
Detection queries are available on the platform. Get full rules →