PT-2025-30081 · Crushftp · Crushftp

Ben Spink

·

Published

2025-07-18

·

Updated

2025-09-09

·

CVE-2025-54309

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:**

CrushFTP versions prior to 10.8.5 and versions prior to 11.3.4 23

**Description:**

CrushFTP is vulnerable to a critical flaw that allows remote attackers to obtain administrative access via HTTPS when the DMZ proxy feature is not used. This vulnerability arises from improper handling of AS2 validation. Active exploitation of this vulnerability has been observed since July 18, 2025, and it is estimated that over 1,000 servers remain vulnerable. Attackers have been observed hijacking the “crushadmin” account as a backdoor. The vulnerability has a CVSS score of 9.0 and is considered critical due to the potential for complete administrative access.

**Recommendations:**

CrushFTP versions prior to 10.8.5 should be updated.

CrushFTP versions prior to 11.3.4 23 should be updated.

Exploit

Fix

LPE

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-08775
CVE-2025-54309

Affected Products

Crushftp