PT-2025-14099 · Crushftp · Crushftp
Mortem
·
Published
2025-03-13
·
Updated
2025-07-21
·
CVE-2025-31161
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
CrushFTP versions 10.0.0 through 10.8.3
CrushFTP versions 11.0.0 through 11.3.0
Description:
A critical authentication bypass vulnerability in CrushFTP allows unauthenticated remote access, enabling attackers to bypass security restrictions, gain access to the administrative account, and execute arbitrary commands. The vulnerability arises from a race condition in the AWS4-HMAC authorization method of the HTTP component of the FTP server. By sending a mangled AWS4-HMAC header with only the username and a following slash (/), an attacker can trigger the successful anypass authentication process. This issue has been exploited in the wild since March 30, 2025, and has been used to compromise systems, with over 815 vulnerable servers still exposed. The vulnerability can lead to a full compromise of the system by obtaining an administrative account.
Recommendations:
For CrushFTP versions 10.0.0 through 10.8.3, update to version 10.8.4 or later.
For CrushFTP versions 11.0.0 through 11.3.0, update to version 11.3.1 or later.
As a temporary workaround, consider using a DMZ proxy instance to mitigate the risk of exploitation.
Exploit
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 145
- 🔥 https://huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation · Exploit
- 🔥 https://projectdiscovery.io/blog/crushftp-authentication-bypass · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-31161-detect-crushftp-vulnerability · Exploit
- 🔥 https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis · Exploit
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update · Security Note
- https://bdu.fstec.ru/vul/2025-03886 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=Update#section-Update-VulnerabilityInfo · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-31161 · Security Note
- https://github.com/gotr00t0day/3xplo1tz⭐ 17 🔗 4 · Note
- https://twitter.com/transilienceai/status/1913198327484862776 · Twitter Post
- https://twitter.com/ScyScan/status/1909683138231779813 · Twitter Post
- https://twitter.com/transilienceai/status/1911599254377816476 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1kpgjly/top_10_trending_cves_18052025 · Reddit Post
- https://twitter.com/transilienceai/status/1909960920446681247 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1909706256882843715 · Twitter Post