CVE-2025-31161 is being actively exploited and it’s not getting the attention it should.


Urgent Security Alert: Critical Vulnerability in CrushFTP Requires Immediate Action

In the ever-evolving landscape of cybersecurity threats, vigilance is paramount. Recently, a significant vulnerability identified as CVE-2025-31161 has come to light, and it’s crucial for users of CrushFTP to be aware and take action immediately.

This particular vulnerability allows for an authentication bypass, which is a serious concern given that it is actively being exploited in real-world scenarios. Specifically, the flaw impacts CrushFTP versions ranging from 10.0.0 to 10.8.3 and from 11.0.0 to 11.3.0. Malicious actors can potentially exploit this weakness to gain unauthorized access to sensitive data without the need for valid authentication credentials, which may lead to full control over the affected systems, depending on individual server configurations.

Despite the confirmed active exploitation of this vulnerability, it seems to be receiving inadequate attention. This could lead to severe consequences if left unaddressed.

To mitigate the risk associated with CVE-2025-31161, it is strongly advised that users promptly update their CrushFTP installations to at least versions 10.8.4 or 11.3.1. For those unable to apply the patch immediately, utilizing CrushFTP’s DMZ proxy may serve as a temporary protective measure.

If you or anyone you know operates CrushFTP, now is the critical moment to verify your Software version and implement the necessary updates. With potential implications for further exploitation, including the possibility of this vulnerability appearing in future ransomware campaigns, proactive measures are essential.

Stay safe, stay informed, and prioritize your cybersecurity!


This article presents an overview of the current security risk associated with CrushFTP and highlights the importance of timely action to protect sensitive data from exploitation.

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *