The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-24366

CVE-2025-24366: SFTPGo Rsync Command RCE Vulnerability

CVE-2025-24366 is a remote code execution vulnerability in SFTPGo's optional rsync command that lets authenticated users read or write files with server permissions. This article covers technical details, affected versions, and patches.

Updated: January 22, 2026

CVE-2025-24366 Overview

CVE-2025-24366 is a command injection vulnerability in SFTPGo, an open source, event-driven file transfer solution. The vulnerability exists in the optional rsync command execution feature, which is disabled by default but can be activated by administrators. When enabled, the feature is limited to the local filesystem and does not work with cloud or remote storage backends.

Due to missing sanitization of client-provided rsync command arguments, an authenticated remote user can abuse specific rsync options to read or write arbitrary files with the permissions of the SFTPGo server process. This constitutes a serious security risk as it allows authenticated attackers to potentially access sensitive configuration files, credentials, or modify system files.

Critical Impact

Authenticated attackers can leverage unsanitized rsync command options to perform unauthorized file read/write operations with SFTPGo server process permissions, potentially leading to data exfiltration or system compromise.

Affected Products

  • SFTPGo versions prior to v2.6.5
  • SFTPGo installations with the optional rsync command enabled
  • Systems running SFTPGo with SSH command execution configured

Discovery Timeline

  • 2025-02-07 - CVE-2025-24366 published to NVD
  • 2025-02-07 - Last updated in NVD database

Technical Details for CVE-2025-24366

Vulnerability Analysis

This vulnerability is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as command injection. The flaw resides in the SSH command handling functionality of SFTPGo, specifically within the rsync command processing logic.

SFTPGo supports execution of a defined set of commands via SSH connections. While most commands are enabled by default, certain optional commands like rsync require explicit activation in the configuration. The vulnerability arises because when the rsync command is enabled, the application fails to properly validate and sanitize the command-line arguments provided by authenticated clients.

The rsync utility supports numerous command-line options that can be exploited maliciously. Without proper argument validation, an attacker can craft specific rsync options to achieve arbitrary file read or write operations on the underlying system. This bypasses the intended access controls and allows operations outside the user's designated directory.

Root Cause

The root cause of this vulnerability is insufficient input validation on client-supplied rsync command arguments. The SFTPGo application did not implement a whitelist of allowed rsync options or enforce strict format validation on the command parameters. This oversight allowed authenticated users to pass arbitrary rsync flags that could be leveraged to access files beyond their authorized scope.

The fix implemented in v2.6.5 addresses this by checking the client-provided arguments and enforcing a supported format while limiting the allowed options to a safe subset.

Attack Vector

The attack vector requires network access and valid authentication credentials to the SFTPGo server. An attacker must:

  1. Authenticate to the SFTPGo server via SSH
  2. Have access to a configuration where the rsync command is enabled
  3. Craft malicious rsync command arguments to exploit the lack of sanitization
  4. Execute file read or write operations with the privileges of the SFTPGo process

The attack complexity is considered high as it requires specific conditions (rsync enabled, valid credentials) to be met before exploitation is possible.

go
// Security patch snippet from internal/sftpd/ssh_cmd.go
// rsync: enforce a supported format and limit the allowed options
 	"os/exec"
 	"path"
 	"runtime/debug"
+	"slices"
 	"strings"
 	"sync"
 	"time"

Source: GitHub Commit Reference

Detection Methods for CVE-2025-24366

Indicators of Compromise

  • Unusual rsync command execution patterns in SFTPGo logs with non-standard options
  • Unexpected file access or modification events by the SFTPGo process outside designated user directories
  • SSH session logs showing rsync commands with suspicious flag combinations
  • File integrity monitoring alerts for sensitive system files accessed by the SFTPGo process

Detection Strategies

  • Monitor SFTPGo logs for rsync command executions containing unusual or dangerous options such as --rsh, --config, or path traversal sequences
  • Implement file integrity monitoring on sensitive system files and directories accessible to the SFTPGo process
  • Deploy network detection rules to identify anomalous SSH traffic patterns to SFTPGo servers
  • Review authentication logs for repeated failed attempts followed by successful logins with immediate rsync activity

Monitoring Recommendations

  • Enable verbose logging for SSH command execution in SFTPGo configuration
  • Configure SIEM alerts for rsync-related events from SFTPGo server processes
  • Establish baseline behavior for normal rsync usage patterns and alert on deviations
  • Monitor for privilege escalation attempts following rsync command abuse

How to Mitigate CVE-2025-24366

Immediate Actions Required

  • Upgrade SFTPGo to version v2.6.5 or later immediately
  • If immediate upgrade is not possible, disable the rsync command in SFTPGo configuration
  • Audit all SFTPGo configurations to identify instances where rsync is enabled
  • Review access logs for any suspicious rsync activity that may indicate prior exploitation

Patch Information

The vulnerability has been fixed in SFTPGo version v2.6.5. The patch implements strict validation of client-provided rsync arguments, enforcing a supported format and limiting the allowed options to prevent abuse. Users are strongly advised to upgrade to this version or later.

For detailed information about the fix, refer to:

  • GitHub Commit Reference
  • GitHub Security Advisory

Workarounds

  • Disable the rsync command in SFTPGo configuration if not required for business operations (this is the default configuration)
  • Implement network segmentation to limit SSH access to SFTPGo servers from trusted sources only
  • Apply principle of least privilege to the SFTPGo server process user account
  • Use host-based intrusion detection to monitor for unauthorized file access patterns
bash
# Configuration example - Disable rsync in SFTPGo
# In sftpgo.json, ensure rsync is not in the enabled_ssh_commands list
# Example configuration snippet:
# "sftpd": {
#   "enabled_ssh_commands": ["scp", "md5sum", "sha1sum"]
# }
# Omit "rsync" from the enabled_ssh_commands array to disable this feature

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSftpgo

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.66%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-78
  • Technical References
  • GitHub Commit Reference

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-30914: SFTPGo Auth Bypass Vulnerability

  • CVE-2026-30915: SFTPGo Path Traversal Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English