Crushftp News Articles

Recent news articles refferecing the vendors vulnerabilities.

CVE-2025-54309 | Arctic Wolf

On July 18, 2025, CrushFTP disclosed that a zero-day vulnerability—now tracked as CVE-2025-54309—had been exploited in the wild, likely for some time.

CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

CISA has added four new vulnerabilities to its KEV Catalog, based on evidence of active exploitation

CrushFTP with 0-day vulnerability CVE-2025-54309 | Born's Tech and Windows World

[German]Anyone from the my blog readers who uses the CrushFTP program for file transfer? In the meantime, several readers have reported (thanks for that) that there are reports of a 0-day vulnerability...

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog.

CrushFTP Zero-Day actively exploited at least since July 18

Hackers exploit CrushFTP zero-day, tracked as CVE-2025-54309, to gain admin access via HTTPS when DMZ proxy is off.

Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309) - Help Net Security

Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution.

Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface.

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

CrushFTP flaw CVE-2025-54309 exploited in wild, giving attackers admin access. Older builds before July 1 are at high risk

CrushFTP zero-day exploited to gain admin access on servers

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.

New CrushFTP zero-day exploited in attacks to hijack servers

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.

CrushFTP zero-day exploited in attacks to gain admin access on servers

CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which allows attackers to gain administrative access via the web interface on vulnerable servers.

CVE-2025-32102 : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the

CVE-2025-32102 : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /We

CVE Trends Dashboard

We're in the process of developing the mobile version of our website to improve your browsing experience on smaller screens. Keep an eye out for its release in the near future.Thank you for your patience!

Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers

CVE-2025-32102

CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.

CVE-2025-32102 Server-Side Request Forgery (SSRF) in CrushFTP...

Server-Side Request Forgery (SSRF) in CrushFTP Versions 9.x, 10.x, and 11.x CrushFTP versions 9.x and 10.x through 10.8.4, along with versions 11.x through 11.

CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats

The makers of the popular file transfer tool CrushFTP say a responsibly disclosed vulnerability in the software has been weaponized. CISA and cyber researchers are sounding alarm bells.

CrushFTP Exploitation Continues Amid Disclosure Dispute

Attacks on a critical authentication bypass flaw in CrushFTP's file transfer product continue this week after duplicate CVEs sparked confusion.

CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability

CISA has issued a warning about an actively exploited vulnerability in CrushFTP, a popular file transfer server solution.

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-31161 to its Known Exploited Vulnerabilities (KEV) catalog

CISA Adds CVE-2025-31161 To KEV Catalog

CISA warns of CVE-2025-31161 in CrushFTP, enabling authentication bypass. Update to the latest versions now.

CISA Adds One Known Exploited Vulnerability to Catalog | CISA

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-31161(link is external) CrushFTP Authentication Bypass...

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

CrushFTP flaw CVE-2025-31161 exploited since March 30; 815 systems unpatched as agencies race to secure.

Disclosure Drama Clouds CrushFTP Vulnerability Exploitation

CrushFTP CEO Ben Spink slammed several cybersecurity companies for creating confusion around a critical authentication bypass flaw that's currently under attack.

Two CVEs, One Critical Flaw: Inside the CrushFTP Vulnerability Controversy

Two CVEs now exist for an actively exploited CrushFTP vulnerability and much of the security industry is using the ‘wrong one’.

No more news articles to load.