CISA Warns of Active Exploitation of FileZen CVE-2026-25108 Vulnerability
FileZen Vulnerability Added to CISA’s KEV Catalog
A recently disclosed vulnerability in the FileZen file transfer product has been added to the Known Exploited Vulnerabilities (KEV) catalog by the US Cybersecurity and Infrastructure Security Agency (CISA), indicating active exploitation by threat actors.
Vulnerability Details
The vulnerability, identified as CVE-2026-25108, is a case of operating system command injection that can be exploited by an authenticated user to execute arbitrary commands via specially crafted HTTP requests.
Successful exploitation of the issue is only possible when the FileZen Antivirus Check Option is enabled. Furthermore, a bad actor must sign in to the web interface with general user privileges to carry out an attack.
Vendor Response and Mitigation
Soliton Systems K.K, the Japanese technology company behind FileZen, has confirmed that it has received at least one report of damage caused by the exploitation of this vulnerability. The company has advised users to update to version 5.0.11 or later to mitigate the threat.
Government Advisory
Federal Civilian Executive Branch (FCEB) agencies have been advised to apply the necessary fixes by March 17, 2026, to secure their networks.
Severity and Impact
The vulnerability has been assigned a CVSS v4 score of 8.7, indicating a high level of severity.
Conclusion
The exploitation of this vulnerability highlights the importance of patch management and software security in preventing cyber attacks. Organizations are advised to prioritize the update of vulnerable systems to prevent potential exploitation by threat actors.
