CVE Alert: CVE-2025-54309 – CrushFTP – CrushFTP

CVE-2025-54309

CRITICALCISA KEVExploitation active

CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.

CVSS v3.1 (9)
Vendor
CrushFTP
Product
CrushFTP
Versions
10 lt 10.8.5 | 11 lt 11.3.4_23
CWE
CWE-420, CWE-420 Unprotected Alternate Channel
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Published
2025-07-18T00:00:00.000Z
Updated
2025-07-30T01:36:08.877Z

AI Summary Analysis

Risk verdict

Critical risk with active exploitation in the wild; treat as priority 1 due to KEV presence and ongoing exploitation.

Why this matters

Attacker can obtain full admin access over HTTPS without user interaction, enabling complete control of the server, data exfiltration, chaining to internal systems, or deployment of further malware. Public-facing CrushFTP instances are especially attractive targets; a successful breach can lead to widespread downtime and data loss across file-transfer workflows.

Most likely attack path

Publicly reachable admin interface over HTTPS is targeted; no privileges required, no UI interaction needed, but network access is required (AV:N, PR:N, UI:N). The high complexity (AC:H) suggests weaponised tooling but remains feasible for a motivated actor, particularly if the DMZ proxy feature is not used and standard hardening is absent. Once foothold is gained, attacker can elevate to admin rights and take control of the service.

Who is most exposed

deployments that expose CrushFTP admin interfaces to the internet or poorly segmented DMZs; organisations hosting external file-transfer services or remote sites without robust access controls are especially vulnerable.

Detection ideas

  • Unusual admin logins from new or external IPs/geographies.
  • Creation of new admin accounts or privilege escalations.
  • Access to admin endpoints from unauthorised networks or at unusual times.
  • Sudden changes to DMZ/proxy configuration or admin-related configuration files.
  • Spike in HTTPS login success after failed attempts (brute-force indicators).

Mitigation and prioritisation

  • Patch to the latest supported release: 10.8.5+ or 11.3.4_23+.
  • If patching is not immediate, enable the DMZ proxy feature, restrict admin interfaces to VPN/management networks, and apply network segmentation.
  • Disable or tightly control external admin access; enforce MFA where available.
  • Deploy WAF/IPS rules for admin endpoints and monitor for anomalous admin activity.
  • Change-management: test patches in staging, schedule maintenance windows; document blast-radius and rollback plan. Treat as priority 1 due to KEV presence.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.