New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In

Related

Huawei Zero-Day Attack Behind Luxembourg’s 2025 Nationwide Telecoms Outage

What happened A previously undisclosed zero-day vulnerability in Huawei enterprise...

New GhostLock Tool Abuses Windows API to Block File Access

What happened A security researcher has published a proof-of-concept tool...

Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

What happened Ivanti has disclosed a high-severity remote code execution...

Mirai-Based xlabs_v1 Botnet Exploits Android Debug Bridge to Hijack IoT Devices

What happened Hunt.io researchers have identified a new Mirai-derived botnet...

Share

What happened

New Progress ShareFile bugs could let attackers take over exposed on-premises servers without logging in by chaining an authentication bypass with remote code execution. The issues affect customer-managed ShareFile Storage Zones Controller 5.x deployments. The first flaw, CVE-2026-2699, is an authentication bypass on the Admin.aspx configuration page that can expose restricted admin functionality to an unauthenticated user. The second flaw, CVE-2026-2701, allows a malicious archive to be uploaded and extracted into a server-controlled path, including a web-accessible directory. Researchers showed that the chain could be used to place an ASPX webshell in the ShareFile webroot and execute code remotely on the server. Progress published fixes on April 2 and said customers should upgrade to version 5.12.4 or move to any 6.x release, which is not impacted. 

Who is affected

The direct exposure affects organizations running customer-managed ShareFile Storage Zones Controller 5.x systems, especially internet-facing deployments. The on-premises component is used by organizations that want to store files in their own infrastructure while still using ShareFile’s cloud-based management interface. Researchers estimated that around 30,000 Storage Zone Controller instances are internet-facing. 

Why CISOs should care

This matters because the affected servers sit at the edge of file-sharing workflows and can provide a direct path to server takeover without prior authentication. The attack chain also reaches a system often used for compliance, sovereignty, or internal security reasons, which raises the operational impact if an exposed deployment is compromised. Progress said it has not received reports of active exploitation so far, but classified the issue as critical. 

3 practical actions

Patch affected systems immediately: Upgrade exposed ShareFile Storage Zones Controller 5.x servers to version 5.12.4 or move to an unaffected 6.x release. 

Identify exposed on-premises deployments: Locate any internet-facing Storage Zones Controller instances and prioritize them for immediate remediation. 

Review for tampering and unexpected files: Check affected servers for suspicious configuration changes and unexpected files in web-facing directories, especially where a malicious archive or webshell could have been placed. 

For more news about critical software flaws that can lead to server compromise, click Vulnerability to read more.

IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.