info: name: CrushFTP - Unprotected Alternate Channel author: anshubind severity: critical description: | CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025. impact: | Remote attackers can gain administrative access, leading to full control over the CrushFTP server. remediation: | Update to version 10.8.5, 11.3.4_23 or later. reference: - https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025 - https://nvd.nist.gov/vuln/detail/CVE-2025-54309 - https://github.com/advisories/GHSA-rh5q-v9ww-rqgm - https://github.com/issamjr/CVE-2025-54309-EXPLOIT classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score:9.0 cve-id: CVE-2025-54309 cwe-id: CWE-420 epss-score:0.07464 epss-percentile:0.91328 cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:* metadata: verified:true max-request:1 vendor: crushftp product: crushftp shodan-query: title:"CrushFTP" tags: cve,cve2025,crushftp,rce
variables: cmd:"id"
http: -method: POST path: -"{{BaseURL}}/WebInterface/function/"