#VU113076 Improper authentication in CrushFTP - CVE-2025-54309
Published: July 21, 2025 / Updated: September 12, 2025
Vulnerability identifier: #VU113076
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2025-54309
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
CrushFTP
CrushFTP
Software vendor:
CrushFTP
CrushFTP
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to improper input validation in AS2 file transfer protocol. A remote attacker can obtain the administrator's session and gain unauthorized access to the server.
Remediation
Install updates from vendor's website.
External links
- https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025#section-CompromiseJuly2025-CVE202554309
- https://www.bleepingcomputer.com/news/security/crushftp-zero-day-exploited-in-attacks-to-gain-admin-access-on-servers/
- https://www.rapid7.com/blog/post/crushftp-zero-day-exploited-in-the-wild/