FileZilla 3.40.0 contains a denial of service vulnerability in the local search functionality that allows local attackers to crash the application by supplying a malformed path string. Attackers can trigger the crash by entering a crafted path containing 384 'A' characters followed by 'BBBB' and 'CCCC' sequences in the search directory field and initiating a local search operation.
References
| Link | Resource |
|---|---|
| https://filezilla-project.org | Product |
| https://www.exploit-db.com/exploits/46484 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/filezilla-denial-of-service-via-local-search | Third Party Advisory |
Configurations
History
09 Apr 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Filezilla-project
Filezilla-project filezilla Client |
|
| CPE | cpe:2.3:a:filezilla-project:filezilla_client:3.40.0:-:*:*:*:*:*:* | |
| References | () https://filezilla-project.org - Product | |
| References | () https://www.exploit-db.com/exploits/46484 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/filezilla-denial-of-service-via-local-search - Third Party Advisory |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-09 19:17
NVD link : CVE-2019-25683
Mitre link : CVE-2019-25683
CVE.ORG link : CVE-2019-25683
JSON object : View
Products Affected
filezilla-project
- filezilla_client
CWE
CWE-532
Insertion of Sensitive Information into Log File
