Urgent Security Advisory: Addressing CVE-2025-31161 in CrushFTP
Attention all CrushFTP users! A serious security vulnerability, identified as CVE-2025-31161, is currently being exploited in the wild, and it has not received the level of attention it deserves.
This critical flaw involves an authentication bypass in CrushFTP, impacting versions 10.0.0 through 10.8.3, as well as 11.0.0 through 11.3.0. If left unaddressed, this vulnerability could enable malicious actors to access sensitive files without valid credentials and, depending on system configurations, potentially take full control over the affected systems.
Despite the confirmation of ongoing exploitation, awareness remains surprisingly low. To mitigate this risk, it is crucial to upgrade to the more secure versions—10.8.4 or 11.3.1—immediately.
For those unable to implement a patch right away, utilizing CrushFTP’s DMZ proxy can serve as a temporary safeguard against potential breaches.
If you or someone you know utilizes CrushFTP, now is the time to review your current version and take the necessary steps to secure your systems. Given the severity of this vulnerability, it is entirely plausible that we may soon see its integration into ransomware attacks. Don’t wait until it’s too late—act now to protect your data and systems.
Share this content:
Thank you for bringing this critical vulnerability to our attention. CVE-2025-31161 is indeed a serious concern, and prompt action is essential to safeguard your systems. If you are running affected versions of CrushFTP (10.0.0 to 10.8.3 and 11.0.0 to 11.3.0), I highly recommend upgrading immediately to version 10.8.4 or 11.3.1, as these include patches to address the authentication bypass flaw.
In the interim, configuring a CrushFTP DMZ proxy is a good temporary measure to limit exposure until the upgrade can be completed. Additionally, ensure that your system’s firewall rules and network policies are optimized to restrict access to the server and monitor for any suspicious activity.
If you need assistance with the upgrade process or configuring the DMZ proxy, please refer to the official CrushFTP documentation or contact our support team for detailed guidance. Keeping your systems up-to-date is crucial to prevent exploitation and potential data breaches. Stay vigilant and act swiftly to protect your infrastructure.