Crushftp News Articles
Recent news articles refferecing the vendors vulnerabilities.
CVE-2025-54309 | Arctic Wolf
On July 18, 2025, CrushFTP disclosed that a zero-day vulnerability—now tracked as CVE-2025-54309—had been exploited in the wild, likely for some time.
CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA
CISA has added four new vulnerabilities to its KEV Catalog, based on evidence of active exploitation
CrushFTP with 0-day vulnerability CVE-2025-54309 | Born's Tech and Windows World
[German]Anyone from the my blog readers who uses the CrushFTP program for file transfer? In the meantime, several readers have reported (thanks for that) that there are reports of a 0-day vulnerability...
U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog
U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog.
CrushFTP Zero-Day actively exploited at least since July 18
Hackers exploit CrushFTP zero-day, tracked as CVE-2025-54309, to gain admin access via HTTPS when DMZ proxy is off.
Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309) - Help Net Security
Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution.
Over 1,000 CrushFTP servers exposed to ongoing hijack attacks
Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface.
Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
CrushFTP flaw CVE-2025-54309 exploited in wild, giving attackers admin access. Older builds before July 1 are at high risk
CrushFTP zero-day exploited to gain admin access on servers
CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.
New CrushFTP zero-day exploited in attacks to hijack servers
CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.
CrushFTP zero-day exploited in attacks to gain admin access on servers
CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.
CVE-2025-32102 : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the
CVE-2025-32102 : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /We
CVE Trends Dashboard
We're in the process of developing the mobile version of our website to improve your browsing experience on smaller screens. Keep an eye out for its release in the near future.Thank you for your patience!
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
CVE-2025-32102
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.
CVE-2025-32102 Server-Side Request Forgery (SSRF) in CrushFTP...
Server-Side Request Forgery (SSRF) in CrushFTP Versions 9.x, 10.x, and 11.x CrushFTP versions 9.x and 10.x through 10.8.4, along with versions 11.x through 11.
CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats
The makers of the popular file transfer tool CrushFTP say a responsibly disclosed vulnerability in the software has been weaponized. CISA and cyber researchers are sounding alarm bells.
CrushFTP Exploitation Continues Amid Disclosure Dispute
Attacks on a critical authentication bypass flaw in CrushFTP's file transfer product continue this week after duplicate CVEs sparked confusion.
CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability
CISA has issued a warning about an actively exploited vulnerability in CrushFTP, a popular file transfer server solution.
CISA Warns of CrushFTP Vulnerability Exploitation in the Wild
The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-31161 to its Known Exploited Vulnerabilities (KEV) catalog
CISA Adds CVE-2025-31161 To KEV Catalog
CISA warns of CVE-2025-31161 in CrushFTP, enabling authentication bypass. Update to the latest versions now.
CISA Adds One Known Exploited Vulnerability to Catalog | CISA
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-31161(link is external) CrushFTP Authentication Bypass...
CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
CrushFTP flaw CVE-2025-31161 exploited since March 30; 815 systems unpatched as agencies race to secure.
Disclosure Drama Clouds CrushFTP Vulnerability Exploitation
CrushFTP CEO Ben Spink slammed several cybersecurity companies for creating confusion around a critical authentication bypass flaw that's currently under attack.
Two CVEs, One Critical Flaw: Inside the CrushFTP Vulnerability Controversy
Two CVEs now exist for an actively exploited CrushFTP vulnerability and much of the security industry is using the ‘wrong one’.