CrushFTP - Authentication Bypass (CVE-2025-31161)
CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to login_user_pass() with no password requirement.
CrowdSec analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Exploit Timeline
This timeline shows the history of exploitation attempts for this CVE, as detected by the CrowdSec community.
Unlock the Exploitation timeline with the
CrowdSec Live Exploit Tracker plan
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.