PT-2025-14099 · Crushftp · Crushftp
Mortem
·
Published
2025-03-13
·
Updated
2025-07-26
·
CVE-2025-31161
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
CrushFTP versions 10.0.0 through 10.8.3
CrushFTP versions 11.0.0 through 11.3.0
Description
A critical authentication bypass vulnerability in CrushFTP allows unauthenticated remote access, enabling attackers to bypass security restrictions, gain access to the administrative account, and execute arbitrary commands. The vulnerability arises from a race condition in the AWS4-HMAC authorization method of the HTTP component of the FTP server. By sending a mangled AWS4-HMAC header with only the username and a following slash (/), an attacker can trigger the successful anypass authentication process. This issue has been exploited in the wild since March 30, 2025, and has been used to compromise systems, with over 815 vulnerable servers still exposed. The vulnerability can lead to a full compromise of the system by obtaining an administrative account.
Recommendations
For CrushFTP versions 10.0.0 through 10.8.3, update to version 10.8.4 or later.
For CrushFTP versions 11.0.0 through 11.3.0, update to version 11.3.1 or later.
As a temporary workaround, consider using a DMZ proxy instance to mitigate the risk of exploitation.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-03886
CVE-2025-31161
Affected Products
Crushftp
References · 146
- 🔥 https://huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation · Exploit
- 🔥 https://projectdiscovery.io/blog/crushftp-authentication-bypass · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-31161-detect-crushftp-vulnerability · Exploit
- 🔥 https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-31161 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update#section-Update-VulnerabilityInfo · Vendor Advisory
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update · Security Note
- https://bdu.fstec.ru/vul/2025-03886 · Security Note
- https://github.com/gotr00t0day/3xplo1tz⭐ 17 🔗 4 · Note
- https://reddit.com/r/cybersecurity/comments/1k5als5/cve202531161_is_being_actively_exploited_and_its · Reddit Post
- https://twitter.com/HoplonInfosec/status/1910407434755346857 · Twitter Post
- https://twitter.com/_JohnHammond/status/1908281883726930083 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1kn4i6k/top_10_trending_cves_15052025 · Reddit Post
- https://twitter.com/securityRSS/status/1909676181802148026 · Twitter Post
- https://twitter.com/CCBalert/status/1910011684892066086 · Twitter Post