CISA Warns of Actively Exploited FileZen Vulnerability CVE-2026-25108

CISA has added **CVE-2026-25108**, a critical OS command injection vulnerability in **Soliton Systems FileZen**, to its **Known Exploited Vulnerabilities (KEV) Catalog** due to evidence of active exploitation. Federal agencies must patch immediately, while all organizations are urged to prioritize remediation to reduce exposure to cyberattacks.

---
title: "CISA Warns of Actively Exploited FileZen Vulnerability CVE-2026-25108"
short_title: "CISA adds critical FileZen OS command injection flaw"
description: "CISA has added CVE-2026-25108, an actively exploited OS command injection vulnerability in Soliton Systems FileZen, to its KEV Catalog. Learn mitigation steps now."
author: "Vitus"
date: 2024-02-24
categories: [Cybersecurity, Vulnerabilities]
tags: [cisa, cve-2026-25108, filezen, os-command-injection, kev-catalog]
score: 0.85
cve_ids: [CVE-2026-25108]
---

TL;DR


CISA has added CVE-2026-25108, a critical OS command injection vulnerability in Soliton Systems FileZen, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of active exploitation. Federal agencies must patch immediately, while all organizations are urged to prioritize remediation to reduce exposure to cyberattacks.

---

Main Content

The Cybersecurity and Infrastructure Security Agency (CISA) has escalated its response to an actively exploited vulnerability in Soliton Systems FileZen, adding CVE-2026-25108 to its Known Exploited Vulnerabilities (KEV) Catalog. This move underscores the urgent need for organizations to address the flaw, which poses significant risks to federal and enterprise networks.

Key Points


- CVE-2026-25108 is an OS command injection vulnerability in Soliton Systems FileZen, a popular file-sharing and transfer solution.
- The flaw is actively exploited in the wild, making timely remediation critical for all organizations.
- Binding Operational Directive (BOD) 22-01 mandates federal agencies to patch the vulnerability by the specified due date.
- While BOD 22-01 applies only to Federal Civilian Executive Branch (FCEB) agencies, CISA urges all organizations to prioritize patching to mitigate cyber risks.

Technical Details


CVE-2026-25108 allows attackers to execute arbitrary OS commands on vulnerable FileZen systems. OS command injection vulnerabilities are particularly dangerous because they enable threat actors to gain unauthorized access, escalate privileges, and move laterally within a network. The flaw is likely being exploited to deploy malware, exfiltrate data, or establish persistence in compromised environments.

Attack Vector


Exploitation of CVE-2026-25108 typically involves:
- Sending crafted HTTP requests to the FileZen web interface.
- Injecting malicious commands into vulnerable parameters.
- Executing arbitrary code with the privileges of the affected application.

Impact Assessment


The inclusion of CVE-2026-25108 in the KEV Catalog highlights its severity and the immediate threat it poses. Organizations using FileZen are at risk of:
- Unauthorized access to sensitive data.
- Network compromise and lateral movement by threat actors.
- Disruption of critical operations due to ransomware or other malware deployments.

Affected Systems


- Soliton Systems FileZen versions vulnerable to CVE-2026-25108.
- Organizations using outdated or unpatched versions of FileZen are at highest risk.

Mitigation Steps


CISA and cybersecurity experts recommend the following actions:
1. Apply patches immediately: Update FileZen to the latest secure version provided by Soliton Systems.
2. Isolate vulnerable systems: Restrict network access to FileZen instances until patches are applied.
3. Monitor for suspicious activity: Use intrusion detection systems (IDS) and endpoint protection tools to detect exploitation attempts.
4. Review CISA’s KEV Catalog: Stay informed about other actively exploited vulnerabilities and prioritize remediation efforts.

Conclusion


The addition of CVE-2026-25108 to CISA’s KEV Catalog serves as a critical reminder of the importance of proactive vulnerability management. While federal agencies are required to act swiftly, all organizations must treat this as a wake-up call to strengthen their cybersecurity posture. Failure to patch known exploited vulnerabilities can lead to devastating breaches, financial losses, and reputational damage.

For more details, refer to CISA’s [official advisory](https://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalog) and the [KEV Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog).

References


[^1]: CISA. "[CISA Adds One Known Exploited Vulnerability to Catalog](https://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalog)". Retrieved 2024-02-24.
[^2]: CVE. "[CVE-2026-25108 Detail](https://www.cve.org/CVERecord?id=CVE-2026-25108)". Retrieved 2024-02-24.
[^3]: CISA. "[Binding Operational Directive 22-01](https://www.cisa.gov/binding-operational-directive-22-01)". Retrieved 2024-02-24.

Related CVEs