Liquidfiles

3 CVEs product

Monthly

CVE-2025-56132 HIGH This Month

LiquidFiles filetransfer server is vulnerable to a user enumeration issue in its password reset functionality. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Liquidfiles
NVD
CVSS 3.1
7.3
EPSS
2.5%
CVE-2025-46094 LOW POC Monitor

LiquidFiles before 4.1.2 allows directory traversal by configuring the pathname of a local executable file as an Actionscript. Rated low severity (CVSS 3.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Liquidfiles
NVD
CVSS 3.1
3.8
EPSS
0.1%
CVE-2025-46093 CRITICAL POC Act Now

LiquidFiles before 4.1.2 supports FTP SITE CHMOD for mode 6777 (setuid and setgid), which allows FTPDrop users to execute arbitrary code as root by leveraging the Actionscript feature and the sudoers. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Liquidfiles
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-56132
EPSS 2% CVSS 7.3
HIGH This Month

LiquidFiles filetransfer server is vulnerable to a user enumeration issue in its password reset functionality. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Liquidfiles
NVD
CVE-2025-46094
EPSS 0% CVSS 3.8
LOW POC Monitor

LiquidFiles before 4.1.2 allows directory traversal by configuring the pathname of a local executable file as an Actionscript. Rated low severity (CVSS 3.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Liquidfiles
NVD
CVE-2025-46093
EPSS 0% CVSS 9.9
CRITICAL POC Act Now

LiquidFiles before 4.1.2 supports FTP SITE CHMOD for mode 6777 (setuid and setgid), which allows FTPDrop users to execute arbitrary code as root by leveraging the Actionscript feature and the sudoers. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Liquidfiles
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy