July 25 Advisory: Critical CrushFTP Vulnerability Added to CISA KEV [CVE-2025-54309]

Vulnerability Description

CVE-2025-54309 (CVSS 9.8) is a critical vulnerability affecting CrushFTP10 (prior to version 10.8.5) and CrushFTP11 (prior to version 11.3.4_23). When the DMZ proxy feature is not enabled, improper AS2 validation allows remote attackers to gain administrative access via HTTPS. 

Screenshot-2025-07-25-at-3.37.41-PM.png
Example Exposed CrushFTP Device

Threat Activity

This vulnerability is actively exploited and was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog on July 22, 2025. Other critical CrushFTP vulnerabilities, such as CVE-2025-31161 and CVE-2024-4040, have also been added to the CISA KEV in recent years, making it apparent that CrushFTP is a frequent target for attackers.

CrushFTP has acknowledged the exploitation and released an advisory with remediation steps. They noted the bug likely existed in builds before July 1st, 2025, and that attackers adapted their methods after a related AS2 fix was published. If exploitation is suspected, the developers recommend restoring a previous default user from backup, with detailed instructions available in their advisory.

Additionally, they included the following Indicators of Compromise (IoCs) in their advisory:

  • The presence of “last_logins” in MainUsers/default/user.XML 
  • A recent modification date on default user.XML
  • The default user having administrative access
  • Recently created usernames with administrative privileges
  • Disappearance of buttons in the end-user WebInterface, or a regular user now seeing an Admin button
  • Unrecognized, long, random user IDs (e.g., 7a0d26089ac528941bf8cb998d97f408m)
FieldDetails
CVE-IDCVE-2025-54309 – CVSS 9.8 (Critical) – Assigned by Microsoft
Vulnerability DescriptionCrushFTP 10 (before 10.8.5) and 11 (before 11.3.4_23) when DMZ proxy is not used. Improper AS2 validation allows remote attackers to gain admin access via HTTPS.
Date of DisclosureJuly 18, 2025
Date Reported Actively ExploitedJuly 22, 2025 (Added to CISA KEV)
Affected AssetsCrushFTP Web Interface when the DMZ proxy feature is not in use. 
Vulnerable Software Versions CrushFTP10 before version 10.8.5CrushFTP11 before version 11.3.4_23
PoC Available?There is no evidence that a public proof-of-concept exists.
Exploitation StatusAdded to CISA KEV on July 22, 2025. 
Patch StatusThis vulnerability has been patched in CrushFTP 10.8.5 and CrushFTP 11.3.4_23

At the time of writing, Censys observed 55,683 devices exposing the CrushFTP web interface. While version information is available, it is typically limited to the major version. This means we can infer potential vulnerability for CrushFTP11 instances, but not for CrushFTP10.

The HTTP body of CrushFTP pages often contains a version string in the format:  

11.W.XXX-YYYY_MM_DD_HH_MM

We believe the date in this string corresponds to the update date. When a new CrushFTP release follows a vulnerability disclosure, the date and update number can be mapped to the patched version. For example, if update 756 corresponds to the patched CrushFTP11 version, then instances with major version 11 and update numbers below 756 are potentially vulnerable. This inference is made with medium to low confidence, as it cannot be directly verified.

Screenshot-2025-07-25-at-2.10.25-PM.png
[From CrushFTP Website] The dates of updates often align with dates that specific vulnerabilities were patched

Examples of version strings seen in the HTML body:

src="/WebInterface/custom.js?v=11.W.756-2025_07_18_15_27"
src="/WebInterface/custom.js?v=11.W.664-2025_03_21_11_44"

The queries below can help identify any devices running CrushFTP software, but they are not necessarily vulnerable. 

Censys Platform Query:

web.software: (vendor:"CrushFTP" and product:"CrushFTP Web Interface") and not web.labels.value="HONEYPOT"

Censys ASM Query:

host.services.software: (vendor="CrushFTP" and product="CrushFTP Web Interface") or web_entity.instances.software: (vendor="CrushFTP" and product="CrushFTP Web Interface")

Censys ASM Risk Query:

risks.name = "Vulnerable CrushFTP [CVE-2025-54309]"

Censys Legacy Search Query:

services.software: (vendor="CrushFTP" and product="CrushFTP Web Interface")

crush_kep.png
Map of Exposed CrushFTP Devices

References

Subscribe to our blog