Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/ShareFile Bugs Allow Server Takeover Without Login
CyberSecurity News

ShareFile Bugs Allow Server Takeover Without Login

A critical attack chain has been identified in Progress ShareFile, enabling attackers to seize control of exposed on-premises servers without requiring any prior authentication. The issues affect...

Sarah simpson
Sarah simpson
April 4, 2026 2 Min Read
3 0

A critical attack chain has been identified in Progress ShareFile, enabling attackers to seize control of exposed on-premises servers without requiring any prior authentication.

The issues affect customer-managed ShareFile Storage Zones Controller 5.x deployments, and Progress says customers should upgrade to version 5.12.4 or move to any 6.x release, which is not impacted.

According to Progress and WatchTower, the first bug is an authentication bypass that exposes restricted configuration pages, while the second enables remote code execution via malicious file uploads and execution.

RunZero lists both flaws CVE-2026-2699 (CVSS 9.8) and CVE-2026-2701 (CVSS 9.1) as critical.

Progress ShareFile Vulnerability

The attack targets the ShareFile Storage Zones Controller. This on-premises component lets organizations store files in their own infrastructure while still using ShareFile’s cloud-based management interface.

That design is often used by enterprises with compliance, sovereignty, or internal security requirements, and watchTower estimated that around 30,000 Storage Zone Controller instances are internet-facing.

Because these servers sit at the edge of file-sharing workflows, they are especially attractive targets for ransomware groups and other threat actors.

uploaded file with no extension and randomized name(Source: WatchTowr)
uploaded file with no extension and randomized name(Source: WatchTowr)

WatchTowr found that the authentication bypass is caused by an Execution After Redirect condition on the Admin.aspx configuration page.

In simple terms, the application sends an HTTP 302 redirect to the login page. However, the page logic continues running, which can expose admin functionality to an unauthenticated user.

The researchers said this behavior is tied to the way the application uses a redirect function that does not properly stop execution.

After gaining access to the admin interface, an attacker can modify important zone settings, including storage paths and passphrase-related values.

That access becomes more serious because the second bug allows a malicious archive to be uploaded and extracted into a server-controlled path, including a web-accessible directory.

webshell (and its upload path) in action(Source: WatchTowr)
webshell (and its upload path) in action(Source: WatchTowr)

In the demonstrated chain, this allowed an ASPX webshell to be placed in the ShareFile webroot and for code to be executed remotely on the server.

Progress said it has not received reports of active exploitation so far. However, the vendor classified the issue as critical and published fixes on April 2, 2026.

WatchTower’s timeline shows the bugs were privately disclosed in February, replicated by Progress in mid-February, and fixed in ShareFile Storage Zones Controller 5.12.4 on March 10 before public disclosure in April.

For defenders, the priority is clear: identify any exposed ShareFile Storage Zones Controller 5.x systems, patch immediately, and review them for suspicious configuration changes or unexpected files in web-facing directories.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchransomwareSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Claude Leak Used to Spread Vidar & GhostSocks Malware

Next Post

Critical Fortinet FortiClient EMS 0-Day Act Vulnerability Actively

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us