PT-2025-30081 · Crushftp · Crushftp
Ben Spink
·
Published
2025-07-18
·
Updated
2026-01-18
·
CVE-2025-54309
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
CrushFTP versions prior to 10.8.5 and 11.3.4 23
Description
CrushFTP is affected by a critical vulnerability that allows remote attackers to gain administrative access via HTTPS when the DMZ proxy feature is not used. This is due to improper handling of AS2 validation. The vulnerability, identified as CVE-2025-54309, has a CVSS score of 9.0 and is actively being exploited in the wild. Attackers have been observed hijacking the “crushadmin” account as a backdoor. Over 1,000 instances of CrushFTP remain vulnerable. The vulnerability allows for unauthenticated remote code execution. The flaw was first detected on July 18, 2025, and a proof-of-concept exploit has been released. Approximately 291,903 devices are exposed, with the US, Germany, and Canada being the most affected countries.
Recommendations
Update CrushFTP to version 10.8.5 12 or 11.3.4 26 or later.
Exploit
Fix
LPE
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-08775
CVE-2025-54309
Affected Products
Crushftp
References · 208
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309⭐ 15 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-08775 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025 · Vendor Advisory, Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54309 · Security Note
- https://twitter.com/dailycve/status/1949408622326542684 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m5f0j7/top_10_trending_cves_21072025 · Reddit Post
- https://twitter.com/liontarakos/status/1961782588508426545 · Twitter Post
- https://twitter.com/proficioinc/status/1947974977598411016 · Twitter Post
- https://twitter.com/R4yt3d/status/1960808240989524095 · Twitter Post
- https://twitter.com/GuardzCyber/status/1950874269732184362 · Twitter Post
- https://twitter.com/Crowd_Security/status/1962487193361850532 · Twitter Post
- https://twitter.com/MonThreat/status/1948011621135139101 · Twitter Post
- https://twitter.com/wizconsults/status/1947667317988463046 · Twitter Post
- https://twitter.com/IT_Peurico/status/1948842451369951332 · Twitter Post
- https://twitter.com/threatmirrorsec/status/1947199676995825915 · Twitter Post