top of page

Critical Fortra FileCatalyst Vulnerability Allows Remote Code Execution

Updated: Mar 18

In the ever-evolving landscape of cybersecurity, a critical vulnerability has been disclosed in Fortra FileCatalyst Workflow, a trusted enterprise file transfer solution. The vulnerability, tracked as CVE-2024-25153, poses a severe risk to organizations utilizing this software, as it enables remote code execution (RCE) on vulnerable servers.

What is the Fortra FileCatalyst Workflow Vulnerability (CVE-2024-25153)?

Fortra FileCatalyst Workflow features a web portal that allows users to manage files within their organization. However, the recently discovered CVE-2024-25153 vulnerability lies within this web portal, representing a directory traversal issue that can be exploited by attackers.

Due to this flaw, attackers can manipulate POST requests to bypass security measures and upload malicious files outside designated safe zones. This opens the door for planting dangerous files, such as web shells, directly into the server's web root, granting remote attackers the ability to execute arbitrary code on the system.

Proof-of-Concept Exploit Heightens Risk

Security researcher Tom Wedgbury has published a detailed technical analysis of the vulnerability, along with a Proof-of-Concept (PoC) exploit code on GitHub. While this provides valuable insights for researchers, malicious actors may weaponize the PoC to target vulnerable systems.

The PoC demonstrates how attackers can automatically detect vulnerable systems with anonymous login enabled, obtain session tokens, upload command shells, and execute OS commands, streamlining the exploitation process and heightening the risk of successful attacks.

Potential for Ransomware Attacks

Previous instances of vulnerabilities in similar file transfer applications have led to devastating ransomware infections and data theft, crippling organizations worldwide and across various industries. This emphasizes the potential for the newly disclosed Fortra FileCatalyst Workflow vulnerability to be exploited in the same way.

Urgent Action Required: Patch the Vulnerability

In light of this critical vulnerability, Fortra has promptly issued a patch. Organizations must prioritize the application of this patch, especially given the history of ransomware attacks against similar products.

For more information and guidance on remediation, visit Fortra's advisory.

By staying vigilant and promptly addressing security vulnerabilities, organizations can enhance their cybersecurity posture and protect their digital assets from potential threats.

Recent Posts

See All


bottom of page