Urgent: CVE-2025-31161 is Currently Under Exploitation but Lacking Proper Attention


Beware of CVE-2025-31161: A Critical Vulnerability in CrushFTP

In today’s digital landscape, vulnerabilities can pose serious threats if not addressed promptly. One such vulnerability, labeled CVE-2025-31161, is currently under active exploitation and warrants immediate attention from users of CrushFTP.

What You Need to Know About CVE-2025-31161

CVE-2025-31161 is an authentication bypass vulnerability that affects multiple versions of CrushFTP, specifically versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. Attackers are leveraging this flaw to gain unauthorized access to sensitive files, potentially leading to complete control over affected systems, depending on specific configurations.

Despite the ongoing exploitation, this vulnerability has not received the level of scrutiny it deserves. It presents a significant risk for organizations using vulnerable versions of CrushFTP.

Recommended Actions

To protect your systems, it is crucial to act swiftly. Users are strongly advised to upgrade to either version 10.8.4 or 11.3.1 without delay. Should immediate patching be unfeasible, utilizing CrushFTP’s DMZ proxy can serve as a temporary safeguard while a permanent solution is implemented.

Take Immediate Action

If you’re currently using CrushFTP—or know someone who is—it’s time to verify the version in use and prioritize upgrading. With the potential for this vulnerability to contribute to future ransomware attacks, ensuring your systems are secure is more important than ever.

Don’t wait for an incident to happen. Act now to safeguard your sensitive data and maintain system integrity.


By focusing on vulnerabilities like CVE-2025-31161, we can all contribute to a more secure digital environment. Stay informed and stay protected!

Share this content:

One Comment

  1. Thank you for bringing this critical vulnerability to our attention.

    CVE-2025-31161 is indeed a serious security concern affecting multiple versions of CrushFTP. The best course of action is to update your system immediately to the latest recommended versions (10.8.4 or 11.3.1) as indicated in the advisory. This ensures you receive the latest security patches and reduce the risk of exploitation.

    If immediate upgrading isn’t possible, temporarily deploying a CrushFTP DMZ proxy can help mitigate exposure. Additionally, consider implementing network-level controls such as IP whitelisting or firewall rules to restrict access to the CrushFTP server, reducing potential attack vectors.

    Ensure to review your current CrushFTP version, and verify that no known exploits are targeting your environment. Regularly monitoring security advisories and maintaining good patch management practices are key to safeguarding your systems.

    If you need assistance with identifying the current version or implementing these mitigations, please don’t hesitate to contact our support team for detailed guidance.

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *