PT-2025-14099 · Crushftp · Crushftp
Mortem
·
Published
2025-03-13
·
Updated
2026-01-16
·
CVE-2025-31161
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
CrushFTP versions 10.0.0 through 10.8.3 and versions 11.0.0 through 11.3.0
Description
CrushFTP is affected by an authentication bypass issue that allows attackers to take over the
crushadmin account, unless a DMZ proxy instance is used. This vulnerability, exploited in the wild since March 2025, is due to a race condition in the AWS4-HMAC authorization method of the HTTP component. The server initially verifies user existence without requiring a password, authenticating the session through HMAC verification. A mangled AWS4-HMAC header, containing only a username and a forward slash (/), can bypass authentication, leading to a full system compromise. Attackers have been observed creating backdoor accounts and using tools like MeshCentral and AnyDesk for persistence. Approximately 815 servers were identified as vulnerable, impacting sectors including marketing, retail, and semiconductors. The vulnerability allows attackers to gain administrative access without valid credentials.Recommendations
Update CrushFTP to version 10.8.4 or later.
Update CrushFTP to version 11.3.1 or later.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-03886
CVE-2025-31161
Affected Products
Crushftp
References · 150
- 🔥 https://huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation · Exploit
- 🔥 https://projectdiscovery.io/blog/crushftp-authentication-bypass · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-31161-detect-crushftp-vulnerability · Exploit
- 🔥 https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis · Exploit
- https://bdu.fstec.ru/vul/2025-03886 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-31161 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update#section-Update-VulnerabilityInfo · Vendor Advisory
- https://github.com/gotr00t0day/3xplo1tz⭐ 17 🔗 4 · Note
- https://twitter.com/DMFezzaReed/status/1909324252207100318 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1kf7xj0/top_10_trending_cves_05052025 · Reddit Post
- https://twitter.com/the_yellow_fall/status/1910267170862633201 · Twitter Post
- https://twitter.com/PabloShann84787/status/1997018624176148596 · Twitter Post
- https://twitter.com/CveFindCom/status/1907878795974951309 · Twitter Post
- https://twitter.com/nluedtke1/status/1909034641354273044 · Twitter Post