New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In

Related

Hackers Spread Vidar and GhostSocks Malware Through Claude Code Leak

What happened Hackers are weaponizing the leaked Claude Code source...

Cybersecurity Leaders to Watch in California’s Artificial Intelligence Industry

California’s artificial intelligence industry includes security leaders working across...

Cybersecurity Leaders to Watch in California’s IT & Software Sectors

California’s IT and software sectors continue to produce cybersecurity...

Cybersecurity Leaders to Watch in California’s Software Industry

California’s software industry remains one of the most influential...

Share

What happened

New Progress ShareFile bugs could let attackers take over exposed on-premises servers without logging in by chaining an authentication bypass with remote code execution. The issues affect customer-managed ShareFile Storage Zones Controller 5.x deployments. The first flaw, CVE-2026-2699, is an authentication bypass on the Admin.aspx configuration page that can expose restricted admin functionality to an unauthenticated user. The second flaw, CVE-2026-2701, allows a malicious archive to be uploaded and extracted into a server-controlled path, including a web-accessible directory. Researchers showed that the chain could be used to place an ASPX webshell in the ShareFile webroot and execute code remotely on the server. Progress published fixes on April 2 and said customers should upgrade to version 5.12.4 or move to any 6.x release, which is not impacted. 

Who is affected

The direct exposure affects organizations running customer-managed ShareFile Storage Zones Controller 5.x systems, especially internet-facing deployments. The on-premises component is used by organizations that want to store files in their own infrastructure while still using ShareFile’s cloud-based management interface. Researchers estimated that around 30,000 Storage Zone Controller instances are internet-facing. 

Why CISOs should care

This matters because the affected servers sit at the edge of file-sharing workflows and can provide a direct path to server takeover without prior authentication. The attack chain also reaches a system often used for compliance, sovereignty, or internal security reasons, which raises the operational impact if an exposed deployment is compromised. Progress said it has not received reports of active exploitation so far, but classified the issue as critical. 

3 practical actions

Patch affected systems immediately: Upgrade exposed ShareFile Storage Zones Controller 5.x servers to version 5.12.4 or move to an unaffected 6.x release. 

Identify exposed on-premises deployments: Locate any internet-facing Storage Zones Controller instances and prioritize them for immediate remediation. 

Review for tampering and unexpected files: Check affected servers for suspicious configuration changes and unexpected files in web-facing directories, especially where a malicious archive or webshell could have been placed. 

For more news about critical software flaws that can lead to server compromise, click Vulnerability to read more.