PT-2025-14099 · Crushftp · Crushftp
Mortem
·
Published
2025-03-13
·
Updated
2025-07-26
·
CVE-2025-31161
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
CrushFTP versions 10.0.0 through 10.8.3
CrushFTP versions 11.0.0 through 11.3.0
**Description:**
CrushFTP is affected by an authentication bypass vulnerability that allows attackers to bypass authentication and potentially take over the `crushadmin` account. This vulnerability, exploited in the wild since March 2025, is due to a race condition in the AWS4-HMAC authorization method of the HTTP component. By sending a crafted AWS4-HMAC header with only a username and a trailing slash (/), attackers can bypass authentication and gain administrative access. The vulnerability has been observed being exploited by various threat actors, including the Kill ransomware gang, and has led to the installation of backdoors such as MeshAgent and AnyDesk. Approximately 815 servers were identified as vulnerable, with attacks targeting sectors including marketing, retail, and semiconductors.
**Recommendations:**
CrushFTP versions 10.0.0 through 10.8.3: Upgrade to version 10.8.4 or later.
CrushFTP versions 11.0.0 through 11.3.0: Upgrade to version 11.3.1 or later.
Exploit
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 146
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-31161-detect-crushftp-vulnerability · Exploit
- 🔥 https://huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation · Exploit
- 🔥 https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis · Exploit
- 🔥 https://projectdiscovery.io/blog/crushftp-authentication-bypass · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-31161 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update · Security Note
- https://bdu.fstec.ru/vul/2025-03886 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update#section-Update-VulnerabilityInfo · Vendor Advisory
- https://github.com/gotr00t0day/3xplo1tz⭐ 17 🔗 4 · Note
- https://twitter.com/TweetThreatNews/status/1909613346648621069 · Twitter Post
- https://twitter.com/transilienceai/status/1911599254377816476 · Twitter Post
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31161 · Note
- https://twitter.com/HuntressLabs/status/1908276969810133437 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1kn4i6k/top_10_trending_cves_15052025 · Reddit Post
- https://twitter.com/transilienceai/status/1928360519226085860 · Twitter Post