Version 23: The actively exploited CVE-2025-31161 is flying under the radar and not receiving the necessary focus.

Critical Security Vulnerability Found in CrushFTP: Immediate Action Required

In recent cybersecurity news, a significant vulnerability designated CVE-2025-31161 has come to light, and it is currently being exploited in real-time. This authentication bypass flaw impacts CrushFTP versions 10.0.0 through 10.8.3, as well as versions 11.0.0 to 11.3.0. The implications of this vulnerability are severe, allowing attackers to gain unauthorized access to sensitive files without the need for valid credentials. Depending on system configurations, the exploit could even grant full administrative control to malicious entities.

What’s particularly alarming is that despite confirmed instances of active exploitation, this issue has not garnered the level of attention it warrants.

Recommended Actions for Users

For those operating CrushFTP, it’s imperative to upgrade to either version 10.8.4 or 11.3.1 immediately to mitigate the risk. However, if you’re unable to perform an update at this time, consider utilizing CrushFTP’s DMZ proxy for a temporary protective measure.

Now is the crucial moment to verify which version you are running and ensure you take the necessary steps to patch this vulnerability. Given the nature of cybersecurity threats, it wouldn’t be surprising to see this vulnerability emerge in the context of a ransomware attack soon.

If you or someone you know is using CrushFTP, we encourage you to take action promptly. Protecting your systems and data should always remain a top priority as threats continue to evolve.

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *