CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.
References
| Link | Resource |
|---|---|
| https://packetstorm.news/files/id/190460/ | Exploit Third Party Advisory VDB Entry |
| https://seclists.org/fulldisclosure/2025/Apr/17 | Mailing List Third Party Advisory |
| https://www.crushftp.com/ | Product |
| http://seclists.org/fulldisclosure/2025/Apr/17 | |
| https://seclists.org/fulldisclosure/2025/Apr/17 | Mailing List Third Party Advisory |
Configurations
History
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://packetstorm.news/files/id/190460/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2025-04-15 13:15
Updated : 2025-11-03 20:18
NVD link : CVE-2025-32102
Mitre link : CVE-2025-32102
CVE.ORG link : CVE-2025-32102
JSON object : View
Products Affected
crushftp
- crushftp
CWE
CWE-918
Server-Side Request Forgery (SSRF)
