vulnerability
WinSCP: CVE-2021-3331: Vulnerability in WinSCP
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Jan 27, 2021 | Sep 11, 2025 | Mar 25, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 27, 2021
Added
Sep 11, 2025
Modified
Mar 25, 2026
Description
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
Solution
winscp-winscp-upgrade-latest
References
- CVE-2021-3331
- https://attackerkb.com/topics/CVE-2021-3331
- https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d
- https://winscp.net/eng/docs/history#5.17.10
- https://winscp.net/eng/docs/rawsettings
- https://winscp.net/tracker/1943
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-26662
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.