CVE-2025-34110

CRITICAL

ColoradoFTP Server < 1.3 Build 8 - Path Traversal

Title source: llm

Description

A directory traversal vulnerability exists in ColoradoFTP Server ≤ 1.3 Build 8 for Windows, allowing unauthenticated attackers to read or write arbitrary files outside the configured FTP root directory. The flaw is due to insufficient sanitation of user-supplied file paths in the FTP GET and PUT command handlers. Exploitation is possible by submitting traversal sequences during FTP operations, enabling access to system-sensitive files. This issue affects only the Windows version of ColoradoFTP.

Exploits (2)

exploitdb WRITEUP
by Rv3Laboratory · textwebappsjava
https://www.exploit-db.com/exploits/40231
metasploit WORKING POC
by h00die <[email protected]>, RvLaboratory · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ftp/colorado_ftp_traversal.rb

Scores

CVSS v4 9.3
EPSS 0.4128
EPSS Percentile 97.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Details

CWE
CWE-22 CWE-306 CWE-552
Status published
Products (1)
ColoradoFTP/Server < 1.3 Build 8
Published Jul 15, 2025
Tracked Since Feb 18, 2026