CISA Adds FileZen CVE-2026-25108 to KEV After Active Exploitation
CISA flags FileZen command injection flaw (CVE-2026-25108, CVSS 8.7) as actively exploited. Federal agencies must patch by March 17, 2026.
CISA added an actively exploited command injection vulnerability in Soliton Systems' FileZen file transfer appliance to its Known Exploited Vulnerabilities catalog on February 24, 2026. Federal civilian executive branch agencies now face a March 17 deadline to apply patches.
The vulnerability, tracked as CVE-2026-25108, carries a CVSS v4 score of 8.7 and allows authenticated attackers to execute arbitrary operating system commands through specially crafted HTTP requests. Soliton confirmed receiving "at least one report of damage caused by the exploitation of this vulnerability."
Technical Details
FileZen is a file-sharing and secure data transfer appliance manufactured by Japanese vendor Soliton Systems K.K. The product is popular among enterprises needing to transfer sensitive files between internal systems and external partners.
The command injection flaw exists when the FileZen Antivirus Check Option is enabled. An authenticated user can submit a malicious HTTP request that injects OS commands into the antivirus scanning process. Those commands execute with the privileges of the FileZen service account.
Affected versions:
- FileZen 4.2.1 through 4.2.8
- FileZen 5.0.0 through 5.0.10
FileZen S is not affected by this vulnerability.
Exploitation Requirements
Successful attacks require three conditions:
- Valid credentials - The attacker must authenticate to the FileZen web interface
- Antivirus scanning enabled - The target instance must have the Antivirus Check Option turned on
- Crafted HTTP request - A specifically formatted request triggers the injection
The authentication requirement limits opportunistic mass exploitation. But given that file transfer appliances often sit at network perimeters and handle sensitive data, attackers with stolen credentials can quickly pivot to full system compromise.
File transfer appliances have become prime targets for threat actors. We've seen similar patterns with SolarWinds vulnerabilities and other enterprise file transfer tools that attackers exploit to stage data theft and ransomware deployment.
Why This Matters
Soliton's confirmation of real-world attacks means this isn't theoretical. Someone is actively exploiting FileZen instances right now.
File transfer appliances are high-value targets because they process sensitive documents moving between organizations. Compromising one gives attackers access to everything flowing through it, plus a foothold inside the network perimeter.
CISA's KEV catalog addition signals they have credible intelligence about exploitation. Under BOD 22-01, federal agencies must remediate KEV vulnerabilities within the specified deadline. Private sector organizations should treat KEV additions as urgent regardless of regulatory requirements.
Recommended Mitigations
Soliton released version 5.0.11 to address the vulnerability. Organizations running affected versions should:
- Update immediately to FileZen 5.0.11 or later
- Reset all user passwords as a precaution, since attackers accessed legitimate accounts
- Review access logs for suspicious authentication patterns or unusual file transfers
- Disable antivirus scanning temporarily if patching isn't immediately possible (reduces attack surface but removes malware protection)
- Segment network access to limit who can reach the FileZen management interface
For organizations still using legacy appliance-based file transfer tools, this incident reinforces why edge device security remains a persistent challenge. CISA's binding operational directive on edge device replacement reflects growing recognition that aging perimeter appliances represent systemic risk.
Related Articles
VMware Aria Operations RCE Flaw Added to CISA KEV Catalog
CISA confirms active exploitation of VMware Aria Operations CVE-2026-22719, a command injection flaw enabling unauthenticated RCE. Patch by March 24.
Mar 19, 2026Marimo RCE Exploited 10 Hours After Disclosure—CISA Adds to KEV
CVE-2026-39987 in Marimo Python notebooks allows unauthenticated RCE via terminal WebSocket. Attackers weaponized it within hours. Patch to 0.23.0 now.
Apr 11, 2026CISA Orders Citrix NetScaler Patches by April 2 After KEV Addition
CVE-2026-3055 now actively exploited. CISA adds the CVSS 9.3 memory leak to KEV catalog, giving federal agencies until April 2 to patch SAML IdP configurations.
Mar 31, 2026F5 BIG-IP Flaw Upgraded to RCE After Active Exploitation Confirmed
CISA added CVE-2025-53521 to its KEV catalog after F5 reclassified the BIG-IP APM vulnerability from DoS to remote code execution. CVSS 9.8—federal deadline is March 30.
Mar 29, 2026