CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
References
| Link | Resource |
|---|---|
| https://www.bleepingcomputer.com/news/security/crushftp-zero-day-exploited-in-attacks-to-gain-admin-access-on-servers/ | Press/Media Coverage |
| https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025 | Vendor Advisory |
| https://www.rapid7.com/blog/post/crushftp-zero-day-exploited-in-the-wild/ | Press/Media Coverage |
| https://www.vicarius.io/vsociety/posts/cve-2025-54309-detect-crushftp-vulnerability | Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-54309-mitigate-crushftp-vulnerability | Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54309 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
05 Nov 2025, 19:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54309 - US Government Resource |
Information
Published : 2025-07-18 19:15
Updated : 2025-11-05 19:25
NVD link : CVE-2025-54309
Mitre link : CVE-2025-54309
CVE.ORG link : CVE-2025-54309
JSON object : View
Products Affected
crushftp
- crushftp
CWE
CWE-420
Unprotected Alternate Channel
