Currently being exploited, CVE-2025-31161 is flying under the radar and isn’t receiving adequate focus.

Urgent Security Alert: CVE-2025-31161 Vulnerability in CrushFTP

In recent cybersecurity developments, a critical authentication bypass vulnerability identified as CVE-2025-31161 is currently under active exploitation and is not receiving the attention it urgently requires.

This flaw specifically impacts CrushFTP versions ranging from 10.0.0 to 10.8.3, as well as versions 11.0.0 to 11.3.0. Malicious actors could exploit this vulnerability to access sensitive files without proper credentials, potentially allowing them to gain complete control over the system, contingent on the configuration.

Despite reports confirming ongoing exploitation, this issue remains largely overlooked, increasing the urgency for action. Security experts recommend that users immediately upgrade their installations to version 10.8.4 or 11.3.1 to mitigate the potential risks associated with this vulnerability.

For those unable to apply the patch right away, utilizing CrushFTP’s DMZ proxy could serve as a temporary safeguard.

If you are operating CrushFTP or know someone who does, now is the critical moment to verify your version and apply the necessary updates. Given the severity of this vulnerability, it wouldn’t be surprising to see it featured in future ransomware attacks. Ensure your systems are secured; proactive measures today can prevent significant issues tomorrow.

Share this content:

One Comment

  1. Thank you for bringing this critical security issue to our attention.

    The CVE-2025-31161 vulnerability in CrushFTP is indeed serious, especially given its active exploitation and potential impact on affected systems. To mitigate this risk, we recommend immediately verifying your current CrushFTP version. If you are running any version from 10.0.0 to 10.8.3 or 11.0.0 to 11.3.0, please prioritize updating to the latest secure versions: 10.8.4 or 11.3.1, respectively.

    As an interim measure, utilizing CrushFTP’s DMZ proxy can help reduce exposure by isolating the vulnerable service from direct external access. However, this is only a temporary safeguard and should not replace applying the official patches.

    Ensure to review your system logs for any signs of exploitation, and consider implementing additional security measures such as network segmentation and stronger access controls. Regularly updating your Software and monitoring for security advisories is vital to maintaining a secure environment.

    If you need further assistance with upgrading or securing your CrushFTP setup, please contact our support team or consult the official CrushFTP security bulletin for detailed guidance.

    Stay vigilant and proactive—timely action can significantly reduce your risk exposure and protect your data from potential threats.

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *