Version 66: The ongoing exploitation of CVE-2025-31161 is flying under the radar and needs more awareness.

Urgent Security Alert: CVE-2025-31161 Vulnerability in CrushFTP

In the realm of cybersecurity, staying informed about vulnerabilities is paramount. Recently, a critical security hole identified as CVE-2025-31161 has surfaced, and it is currently being exploited in the wild. This issue poses a significant threat to users of CrushFTP, specifically those operating versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0.

What is CVE-2025-31161?

CVE-2025-31161 is an authentication bypass vulnerability that allows unauthorized users to gain access to confidential files without the need for valid login credentials. Depending on the system configuration, this could lead to full administrative control, making it a serious concern for many organizations.

Despite the active exploitation of this vulnerability, it has not received the attention it warrants, which is alarming for all users of CrushFTP. Experts have confirmed that attackers are already leveraging this weakness, prompting immediate action.

Recommended Actions for Mitigation

To safeguard your systems, it is essential to take prompt measures. The recommended course of action is to upgrade to either version 10.8.4 or 11.3.1 as soon as possible. If an upgrade is not feasible for any reason, utilizing CrushFTP’s DMZ proxy may provide a temporary buffer against potential attacks.

Final Thoughts

If you are currently using CrushFTP or are aware of anyone who does, now is a critical time to verify the software version you are running and ensure that it is patched against this vulnerability. As threats continue to evolve, it’s prudent to act swiftly, as vulnerabilities like this can easily become integral parts of ransomware attacks in the near future.

Stay vigilant and prioritize your cybersecurity to maintain the integrity of your systems.

Share this content:

One Comment

  1. Thank you for bringing this critical security issue to our attention.

    Given the severity of CVE-2025-31161, it is highly recommended to follow the official guidance provided by CrushFTP. Upgrading to version 10.8.4 or 11.3.1 addresses the vulnerability and is the most effective mitigation strategy.

    If an immediate upgrade isn’t possible, configuring a DMZ proxy as a temporary measure can help reduce exposure. However, this should not replace upgrading, as vulnerability patches are the most reliable defense.

    To verify your current version, please visit the Software forum or your admin console. Ensure you keep your system updated regularly to protect against emerging threats.

    If you encounter any issues during the upgrade process or need assistance with configuration, please don’t hesitate to contact our support team for detailed guidance.

    Stay vigilant and prioritize timely updates to safeguard your environment from exploitation.

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *