Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34110: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ColoradoFTP Server

0
Critical
VulnerabilityCVE-2025-34110cvecve-2025-34110cwe-22cwe-552cwe-306
Published: Tue Jul 15 2025 (07/15/2025, 13:01:10 UTC)
Source: CVE Database V5
Vendor/Project: ColoradoFTP
Product: Server

Description

CVE-2025-34110 is a critical path traversal vulnerability in ColoradoFTP Server versions up to 1. 3 Build 8 on Windows. It allows unauthenticated attackers to read or write arbitrary files outside the FTP root directory by exploiting insufficient sanitization of file paths in FTP GET and PUT commands. The flaw enables attackers to submit directory traversal sequences to access sensitive system files, potentially leading to data disclosure or system compromise. No authentication or user interaction is required, and the vulnerability has a CVSS 4. 0 score of 9. 3, indicating high impact on confidentiality and integrity. Although no known exploits are currently in the wild, the ease of exploitation and severity make this a critical threat. The issue affects only the Windows version of ColoradoFTP Server. Organizations using this FTP server should prioritize patching or applying mitigations immediately to prevent unauthorized file access and potential system control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:25:40 UTC

Technical Analysis

CVE-2025-34110 is a critical security vulnerability classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) found in ColoradoFTP Server versions up to 1.3 Build 8 for Windows. The vulnerability arises from inadequate sanitization of user-supplied file paths in the FTP GET and PUT command handlers. Specifically, the server fails to properly restrict directory traversal sequences such as '../' in FTP commands, allowing unauthenticated remote attackers to escape the configured FTP root directory. This enables them to read or write arbitrary files on the underlying Windows system, potentially accessing sensitive configuration files, system binaries, or user data. The vulnerability does not require any authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 base score of 9.3 reflects its criticality, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality and integrity is high, as attackers can disclose or modify files outside the intended FTP directory. The vulnerability is limited to the Windows version of ColoradoFTP Server, which is a niche FTP server product. No patches or official fixes have been released yet, and no known exploits have been observed in the wild, though the vulnerability is straightforward to exploit. This flaw also relates to CWE-552 (Files or Directories Accessible to External Parties) and CWE-306 (Missing Authentication for Critical Function), highlighting the lack of access control and input validation. Organizations using ColoradoFTP Server on Windows should consider immediate mitigation steps to prevent exploitation.

Potential Impact

The impact of CVE-2025-34110 is significant for organizations using ColoradoFTP Server on Windows. Successful exploitation allows unauthenticated attackers to bypass FTP root directory restrictions and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive data such as credentials, configuration files, or intellectual property. Additionally, attackers can write or modify files, potentially enabling further compromise through webshells, malware deployment, or system configuration changes. The ability to write files without authentication increases the risk of persistent backdoors or ransomware deployment. The vulnerability undermines the confidentiality and integrity of affected systems and may also impact availability if critical system files are overwritten or deleted. Given the network-exploitable nature and lack of required privileges, this vulnerability poses a high risk to organizations, especially those exposing FTP services to untrusted networks or the internet. The absence of known exploits in the wild provides a window for proactive mitigation, but the critical severity demands urgent attention to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2025-34110, organizations should immediately assess their use of ColoradoFTP Server on Windows and restrict or disable the service if not essential. Since no official patches are currently available, consider the following specific actions: 1) Implement network-level controls such as firewall rules to limit FTP access to trusted IP addresses only. 2) Employ FTP server configuration options to restrict file operations strictly within the intended root directory, if configurable. 3) Use application-layer proxies or FTP gateways that sanitize and validate FTP commands to prevent directory traversal sequences. 4) Monitor FTP server logs for suspicious GET or PUT commands containing traversal patterns (e.g., '../'). 5) If possible, replace ColoradoFTP Server with a more secure and actively maintained FTP server product that properly validates file paths. 6) Apply host-based intrusion detection to alert on unauthorized file access or modifications outside expected directories. 7) Educate system administrators on the risks and ensure timely updates when vendor patches become available. 8) Consider isolating FTP servers in segmented network zones to limit lateral movement in case of compromise. These targeted mitigations go beyond generic advice by focusing on access restrictions, input validation, monitoring, and architectural controls to reduce exploitation risk until a vendor patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687654a5a83201eaaccea520

Added to database: 7/15/2025, 1:16:21 PM

Last enriched: 3/24/2026, 12:25:40 AM

Last updated: 3/24/2026, 8:15:49 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses