Skip to main content

Security Update Released for CrushFTP

CrushFTP has released a security update addressing a critical vulnerability that could lead to unauthorised access via remote and unauthenticated HTTP requests

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

CrushFTP has released a security update addressing a critical vulnerability that could lead to unauthorised access via remote and unauthenticated HTTP requests


Affected platforms

The following platforms are known to be affected:

Threat details

Exploitation of CVE-2025-2825

A public proof-of-concept exploit is available for CVE-2025-2825 and exploitation has been reported in the wild. The NHS England National CSOC assesses that continued exploitation of this vulnerability is considered highly likely.


Introduction

vulnerability has been disclosed in CrushFTP, a file server supporting standard secure file transfer protocols, after being discovered by a security researcher.

The vulnerability designated as CVE-2025-2825 is a critical 'improper authentication' vulnerability with a CVSSv3 score of 9.8. Successful exploitation could allow an unauthenticated attacker to craft remote and unauthenticated HTTP requests to CrushFTP, which could lead to unauthorised access.

Note: The vulnerability is not exploitable if organisations have implemented the demilitarised zone (DMZ) function of CrushFTP. 


Threat updates

Date Update
2 Apr 2025 Exploitation of CVE-2025-2825
1 Apr 2025 Proof-of-Concept exploit released for CVE-2025-2825
27 Mar 2025 Vulnerability has been designated as CVE-2025-2825

Remediation advice

Affected organisations are encouraged to review the latest CrushFTP release notes and update CrushFTP to version 11.3.1 (or above) as soon as practicable. 



Last edited: 2 April 2025 1:30 pm