Critical severity9.8NVD Advisory· Published Dec 19, 2025· Updated Apr 9, 2026
CVE-2023-53959
CVE-2023-53959
Description
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
Affected products
1- cpe:2.3:a:filezilla-project:filezilla_client:3.63.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/51267nvdExploitThird Party AdvisoryVDB Entry
- www.vulncheck.com/advisories/filezilla-client-dll-hijacking-via-missing-textshapingdllnvdThird Party Advisory
- filezilla-project.orgnvdProduct
News mentions
0No linked articles in our index yet.