Skip to content
Tech News
← Back to articles

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

read original get ShareFile Security Patch → more articles
Why This Matters

The vulnerabilities in Progress ShareFile highlight the ongoing risks faced by enterprise file transfer solutions, especially as they can be exploited for unauthenticated remote code execution and data exfiltration. Addressing these flaws is crucial for protecting sensitive corporate data and maintaining trust in secure file sharing platforms. The incident underscores the importance of timely security updates and vigilant monitoring for organizations relying on such solutions.

Key Takeaways

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments.

Progress ShareFile is a document sharing and collaboration product typically used by large and mid-sized companies.

Such solutions are an attractive target for ransomware actors, as previously seen in Clop data-theft attacks exploiting bugs in Accellion FTA, SolarWinds Serv-U, Gladinet CentreStack, GoAnywhere MFT, MOVEit Transfer, and Cleo.

Researchers at offensive security company watchTowr discovered an authentication bypass (CVE-2026-2699) and a remote code execution (CVE-2026-2701) in the Storage Zones Controller (SZC) component present in branch 5.x of Progress ShareFile.

SZC gives customers more control over their data by allowing them to store it on their infrastructure (either on-prem or in a third-party cloud provider) or on the Progress systems.

Following watchTowr's responsible disclosure, the problems have been addressed in Progress ShareFile 5.12.4, released on March 10.

How the attack works

In a report today, watchTowr researchers explain that the attack begins by exploiting the authentication bypass issue, CVE-2026-2699, which gives access to the ShareFile admin interface due to improper handling of HTTP redirects.

Once inside, an attacker can modify Storage Zone configuration settings, including file storage paths and security-sensitive parameters such as the zone passphrase and related secrets.

By exploiting the second flaw, CVE-2026-2701, attackers can obtain remote code execution on the server by abusing file upload and extraction functionality to place malicious ASPX webshells in the application’s webroot.

... continue reading