PT-2025-30081 · Crushftp · Crushftp
Ben Spink
·
Published
2025-07-18
·
Updated
2025-10-11
·
CVE-2025-54309
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
CrushFTP versions prior to 10.8.5 and 11.3.4 23
Description
CrushFTP is affected by a critical vulnerability (CVE-2025-54309) that allows remote attackers to gain administrative access via HTTPS when the DMZ proxy feature is not used. This is due to improper handling of AS2 validation. Active exploitation of this vulnerability has been observed in the wild since July 18, 2025, with reports indicating attackers are hijacking the “crushadmin” account for backdoor access. Approximately 55,000 devices are still exposed. The vulnerability has a CVSS score of 9.0 and is considered critical. Attackers are exploiting this flaw to gain complete administrative access, potentially leading to data theft and the installation of backdoors. Over 1,000 instances remain vulnerable. The vulnerability allows unauthenticated remote code execution.
Recommendations
CrushFTP versions prior to 10.8.5 must be updated.
CrushFTP versions prior to 11.3.4 23 must be updated.
Exploit
Fix
RCE
LPE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-08775
CVE-2025-54309
Affected Products
Crushftp
References · 208
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309⭐ 15 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-08775 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54309 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025 · Security Note, Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/723276 · Security Note
- https://twitter.com/elhackernet/status/1947250407383666771 · Twitter Post
- https://twitter.com/trubetech/status/1946404076129751246 · Twitter Post
- https://twitter.com/Trej0Jass/status/1946836510768316881 · Twitter Post
- https://twitter.com/ThomasE895438/status/1954516555200393589 · Twitter Post
- https://twitter.com/securityRSS/status/1946987102882669030 · Twitter Post
- https://twitter.com/windowsforum/status/1946619230188642583 · Twitter Post
- https://twitter.com/cybertzar/status/1946553779865759972 · Twitter Post
- https://twitter.com/trubetech/status/1946337386473853175 · Twitter Post
- https://twitter.com/ncsc_gov_ie/status/1968031265686426046 · Twitter Post
- https://twitter.com/bigmacd16684/status/1961063466879361420 · Twitter Post