Progress Releases Security Updates for ShareFile Storage Zones Controller (SZC)
Successful exploitation could allow an unauthenticated remote attacker to access on-prem storage zones controller’s configuration pages, potentially leading to changes in system configuration and remote code execution
Summary
Successful exploitation could allow an unauthenticated remote attacker to access on-prem storage zones controller’s configuration pages, potentially leading to changes in system configuration and remote code execution
Affected platforms
The following platforms are known to be affected:
Threat details
Proof-of-Concept Exploit
A proof-of-concept exploit for CVE-2026-2701 and CVE-2026-2699 is publicly available. The NHS England National CSOC assesses exploitation as highly likely.
Introduction
Progress has released a security update to address two critical vulnerabilities in ShareFile Storage Zones Controller (SZC). Progress ShareFile was formerly known as Citrix ShareFile.
- CVE-2026-2699 - 'Execution After Redirect' vulnerability - CVSSv3 score: 9.8.
-
CVE-2026-2701 - 'Remote Code Execution' vulnerability - CVSSv3 score: 9.1.
When CVE-2026-2699 and CVE-2026-2701 are chained together, an unauthenticated attacker could perform remote code execution (RCE).
Remediation advice
Affected organisations are encouraged to review Progress ShareFile's security advisory and apply the relevant updates as soon as possible.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 7 April 2026 4:03 pm