PT-2025-30081 · Crushftp · Crushftp
Ben Spink
·
Published
2025-07-18
·
Updated
2025-08-31
·
CVE-2025-54309
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
CrushFTP versions prior to 10.8.5 and versions prior to 11.3.4 23
**Description:**
CrushFTP is vulnerable to a critical security flaw that allows remote attackers to gain administrative access via HTTPS when the DMZ proxy feature is not used. This vulnerability stems from improper handling of AS2 validation. Active exploitation of this flaw has been observed since July 18, 2025, and it is estimated that over 1,000 servers remain vulnerable. Attackers can exploit this vulnerability without authentication. Compromised instances of CrushFTP could lead to data theft, backdoor installation, and potential network infiltration.
**Recommendations:**
CrushFTP versions prior to 10.8.5 should be updated.
CrushFTP versions prior to 11.3.4 23 should be updated.
Exploit
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 180
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309⭐ 15 🔗 1 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/723276 · Security Note
- https://bdu.fstec.ru/vul/2025-08775 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54309 · Security Note
- https://crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025 · Security Note
- https://t.me/pentestingnews/67041 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1n33c72/top_10_trending_cves_29082025 · Reddit Post
- https://t.me/cKure/16238 · Telegram Post
- https://twitter.com/news_24_365/status/1946866312241942757 · Twitter Post
- https://twitter.com/HackRead/status/1961767077720588533 · Twitter Post
- https://twitter.com/dailycve/status/1949408622326542684 · Twitter Post
- https://twitter.com/ScyScan/status/1947376080157086090 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mc7gcg/top_10_trending_cves_29072025 · Reddit Post
- https://twitter.com/elhackernet/status/1947250407383666771 · Twitter Post
- https://twitter.com/securityland_/status/1947635782560452900 · Twitter Post