Urgent Security Alert: Exploitation of CrushFTP Vulnerability CVE-2025-31161
In recent cybersecurity news, a significant vulnerability, CVE-2025-31161, affecting CrushFTP has come to light—and it demands immediate attention. This authentication bypass flaw is being actively exploited by malicious actors, allowing unauthorized access to sensitive files without valid credentials. The potential consequences are grave, as attackers can gain complete system control depending on specific configurations.
This vulnerability impacts CrushFTP versions ranging from 10.0.0 to 10.8.3 and 11.0.0 to 11.3.0. Reports confirm that it is already being utilized in the wild, yet it has not received the level of scrutiny it warrants. As security professionals, it’s crucial to stay vigilant and proactive against such threats.
To mitigate the risks associated with CVE-2025-31161, immediate action is advised. Users are strongly encouraged to upgrade their CrushFTP software to version 10.8.4 or 11.3.1 at the earliest opportunity. For those unable to apply the patch right away, employing CrushFTP’s DMZ proxy can serve as a temporary measure to shield against potential exploitation.
If you or someone you know is using CrushFTP, this is an essential moment to verify your software version and ensure it is up to date. Given the current climate, it would not be surprising to see this vulnerability emerge in ransomware attacks soon. Stay informed and secure your systems to protect against potential threats.
Share this content: