CVE-2025-31161 is being actively exploited and it’s not getting the attention it should.

Title: Urgent Security Alert: CrushFTP Vulnerability CVE-2025-31161 Under Active Exploitation

In the ever-evolving landscape of cybersecurity, a significant flaw has emerged that demands immediate attention: CVE-2025-31161. This authentication bypass vulnerability in CrushFTP is currently being exploited in the wild, raising alarms for users of the Software.

The vulnerability affects CrushFTP versions ranging from 10.0.0 to 10.8.3 and 11.0.0 to 11.3.0. Hackers are taking advantage of this weakness to gain unauthorized access to sensitive files, potentially leading to full system control—depending on the specific configuration of the affected systems.

Despite the confirmed instances of active exploitation, this issue has not garnered the widespread recognition it warrants. Therefore, it is imperative for administrators and users of CrushFTP to take proactive measures.

To mitigate the risks associated with this vulnerability, it is highly recommended to upgrade your installation to version 10.8.4 or 11.3.1 without delay. If upgrading is not feasible at this moment, consider utilizing CrushFTP’s DMZ proxy as a temporary safeguard.

If you or someone you know is using CrushFTP, this is your call to action: verify your Software version and prioritize applying the necessary patches. Given the potential for this vulnerability to be integrated into future ransomware attacks, acting swiftly is essential to protect your systems and sensitive data. Don’t wait until it’s too late—stay vigilant and prioritize your security today.

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *