CVE Alert: CVE-2025-54309 – CrushFTP – CrushFTP
CVE-2025-54309
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
AI Summary Analysis
Risk verdict
Critical risk with active exploitation in the wild; treat as priority 1 due to KEV presence and ongoing exploitation.
Why this matters
Attacker can obtain full admin access over HTTPS without user interaction, enabling complete control of the server, data exfiltration, chaining to internal systems, or deployment of further malware. Public-facing CrushFTP instances are especially attractive targets; a successful breach can lead to widespread downtime and data loss across file-transfer workflows.
Most likely attack path
Publicly reachable admin interface over HTTPS is targeted; no privileges required, no UI interaction needed, but network access is required (AV:N, PR:N, UI:N). The high complexity (AC:H) suggests weaponised tooling but remains feasible for a motivated actor, particularly if the DMZ proxy feature is not used and standard hardening is absent. Once foothold is gained, attacker can elevate to admin rights and take control of the service.
Who is most exposed
deployments that expose CrushFTP admin interfaces to the internet or poorly segmented DMZs; organisations hosting external file-transfer services or remote sites without robust access controls are especially vulnerable.
Detection ideas
- Unusual admin logins from new or external IPs/geographies.
- Creation of new admin accounts or privilege escalations.
- Access to admin endpoints from unauthorised networks or at unusual times.
- Sudden changes to DMZ/proxy configuration or admin-related configuration files.
- Spike in HTTPS login success after failed attempts (brute-force indicators).
Mitigation and prioritisation
- Patch to the latest supported release: 10.8.5+ or 11.3.4_23+.
- If patching is not immediate, enable the DMZ proxy feature, restrict admin interfaces to VPN/management networks, and apply network segmentation.
- Disable or tightly control external admin access; enforce MFA where available.
- Deploy WAF/IPS rules for admin endpoints and monitor for anomalous admin activity.
- Change-management: test patches in staging, schedule maintenance windows; document blast-radius and rollback plan. Treat as priority 1 due to KEV presence.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.