CVE-2025-31161 is being actively exploited and it’s not getting the attention it should.


Beware of CVE-2025-31161: A Critical Vulnerability in CrushFTP

In today’s digital landscape, vulnerabilities can pose serious threats if not addressed promptly. One such vulnerability, labeled CVE-2025-31161, is currently under active exploitation and warrants immediate attention from users of CrushFTP.

What You Need to Know About CVE-2025-31161

CVE-2025-31161 is an authentication bypass vulnerability that affects multiple versions of CrushFTP, specifically versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. Attackers are leveraging this flaw to gain unauthorized access to sensitive files, potentially leading to complete control over affected systems, depending on specific configurations.

Despite the ongoing exploitation, this vulnerability has not received the level of scrutiny it deserves. It presents a significant risk for organizations using vulnerable versions of CrushFTP.

Recommended Actions

To protect your systems, it is crucial to act swiftly. Users are strongly advised to upgrade to either version 10.8.4 or 11.3.1 without delay. Should immediate patching be unfeasible, utilizing CrushFTP’s DMZ proxy can serve as a temporary safeguard while a permanent solution is implemented.

Take Immediate Action

If you’re currently using CrushFTP—or know someone who is—it’s time to verify the version in use and prioritize upgrading. With the potential for this vulnerability to contribute to future ransomware attacks, ensuring your systems are secure is more important than ever.

Don’t wait for an incident to happen. Act now to safeguard your sensitive data and maintain system integrity.


By focusing on vulnerabilities like CVE-2025-31161, we can all contribute to a more secure digital environment. Stay informed and stay protected!

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *