CVE-2025-53899

Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, the back-end of Kiteworks MFT is vulnerable to an incorrectly specified destination in a communication channel which allows an attacker with administrative privileges on the system under certain circumstances to intercept upstream communication which could lead to an escalation of privileges. This issue has been patched in version 9.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:*

History

03 Dec 2025, 17:48

Type Values Removed Values Added
CPE cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:*
References () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-5gx5-vcpp-8cr5 - () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-5gx5-vcpp-8cr5 - Third Party Advisory, Patch
First Time Accellion kiteworks Managed File Transfer
Accellion

29 Nov 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-29 03:15

Updated : 2025-12-03 17:48


NVD link : CVE-2025-53899

Mitre link : CVE-2025-53899

CVE.ORG link : CVE-2025-53899


JSON object : View

Products Affected

accellion

  • kiteworks_managed_file_transfer
CWE
CWE-941

Incorrectly Specified Destination in a Communication Channel