Urgent Security Alert: CVE-2025-31161 Exploited in the Wild
In the ever-evolving landscape of cybersecurity, certain vulnerabilities can often be overlooked, leading to significant risks. One such vulnerability is CVE-2025-31161, an authentication bypass issue currently being exploited by cybercriminals.
This critical flaw affects multiple versions of CrushFTP, specifically versions 10.0.0 through 10.8.3, as well as versions 11.0.0 to 11.3.0. If successfully exploited, this vulnerability allows attackers to bypass authentication and gain access to sensitive files, potentially seizing complete control of affected systems based on their configurations.
What makes this situation even more alarming is that active exploitation of this vulnerability has been confirmed, yet it remains underreported in the cybersecurity community.
Recommended Actions
To ensure your systems remain secure, we strongly recommend that organizations using vulnerable versions of CrushFTP upgrade to versions 10.8.4 or 11.3.1 without delay. If upgrading is not feasible in the short term, consider implementing CrushFTP’s DMZ proxy as a temporary protective measure.
For those managing CrushFTP installations or with colleagues who do, now is the critical moment to verify your software version and address this vulnerability. Given the severity of CVE-2025-31161, it wouldn’t be surprising to see it integrated into ransomware operations shortly.
Stay vigilant and proactive in your cybersecurity efforts. Your organization’s safety depends on it.
Share this content: