Vulnerability Description
LiquidFiles before 4.1.2 supports FTP SITE CHMOD for mode 6777 (setuid and setgid), which allows FTPDrop users to execute arbitrary code as root by leveraging the Actionscript feature and the sudoers configuration.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Liquidfiles | Liquidfiles | < 4.1.2 |
Related Weaknesses (CWE)
References
- https://docs.liquidfiles.com/release_notes/version_4-1-x.htmlRelease Notes
- https://gist.github.com/nikolai0x/f61a8bfcdaa244e0c46931d74d10c4eaThird Party Advisory
- https://projectblack.io/blog/liquidfiles-vulnerability-authenticated-rce/ExploitThird Party Advisory
- https://projectblack.io/blog/liquidfiles-vulnerability-authenticated-rce/ExploitThird Party Advisory
FAQ
What is CVE-2025-46093?
CVE-2025-46093 is a vulnerability with a CVSS score of 9.9 (CRITICAL). LiquidFiles before 4.1.2 supports FTP SITE CHMOD for mode 6777 (setuid and setgid), which allows FTPDrop users to execute arbitrary code as root by leveraging the Actionscript feature and the sudoers ...
How severe is CVE-2025-46093?
CVE-2025-46093 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-46093?
Check the references section above for vendor advisories and patch information. Affected products include: Liquidfiles Liquidfiles.