CVE-2021-3331

CRITICAL

WinSCP <5.17.10 - RCE

Title source: llm
STIX 2.1

Description

WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

References (4)

Core 4
Core References
Release Notes, Vendor Advisory x_refsource_misc
https://winscp.net/eng/docs/history#5.17.10
Patch, Vendor Advisory x_refsource_misc
https://winscp.net/tracker/1943
Vendor Advisory x_refsource_misc
https://winscp.net/eng/docs/rawsettings

Scores

CVSS v3 9.8
EPSS 0.0639
EPSS Percentile 91.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (1)
winscp/winscp < 5.17.10
Published Jan 27, 2021
Tracked Since Feb 18, 2026