Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, the back-end of Kiteworks MFT is vulnerable to an incorrectly specified destination in a communication channel which allows an attacker with administrative privileges on the system under certain circumstances to intercept upstream communication which could lead to an escalation of privileges. This issue has been patched in version 9.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/kiteworks/security-advisories/security/advisories/GHSA-5gx5-vcpp-8cr5 | Third Party Advisory Patch |
Configurations
History
03 Dec 2025, 17:48
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:* | |
| References | () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-5gx5-vcpp-8cr5 - Third Party Advisory, Patch | |
| First Time |
Accellion kiteworks Managed File Transfer
Accellion |
29 Nov 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-29 03:15
Updated : 2025-12-03 17:48
NVD link : CVE-2025-53899
Mitre link : CVE-2025-53899
CVE.ORG link : CVE-2025-53899
JSON object : View
Products Affected
accellion
- kiteworks_managed_file_transfer
CWE
CWE-941
Incorrectly Specified Destination in a Communication Channel
