CVE-2019-25683

FileZilla 3.40.0 contains a denial of service vulnerability in the local search functionality that allows local attackers to crash the application by supplying a malformed path string. Attackers can trigger the crash by entering a crafted path containing 384 'A' characters followed by 'BBBB' and 'CCCC' sequences in the search directory field and initiating a local search operation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filezilla-project:filezilla_client:3.40.0:-:*:*:*:*:*:*

History

09 Apr 2026, 19:17

Type Values Removed Values Added
First Time Filezilla-project
Filezilla-project filezilla Client
CPE cpe:2.3:a:filezilla-project:filezilla_client:3.40.0:-:*:*:*:*:*:*
References () https://filezilla-project.org - () https://filezilla-project.org - Product
References () https://www.exploit-db.com/exploits/46484 - () https://www.exploit-db.com/exploits/46484 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/filezilla-denial-of-service-via-local-search - () https://www.vulncheck.com/advisories/filezilla-denial-of-service-via-local-search - Third Party Advisory

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-09 19:17


NVD link : CVE-2019-25683

Mitre link : CVE-2019-25683

CVE.ORG link : CVE-2019-25683


JSON object : View

Products Affected

filezilla-project

  • filezilla_client
CWE
CWE-532

Insertion of Sensitive Information into Log File