Cybersecurity news without the noise
Published on

Critical CrushFTP Authentication Bypass Vulnerability CVE-2025-31161: What You Need to Know

CVE-2025-31161 is a critical authentication bypass vulnerability that affects CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0.1 This vulnerability allows unauthenticated attackers to bypass authentication and gain unauthorized access to the file transfer system, potentially leading to complete system compromise.2

Impact and Risk

The vulnerability is rated with a CVSS score of 9.8, indicating critical severity.1 Attackers can exploit this vulnerability to:2

  1. Bypass authentication mechanisms
  2. Gain unauthorized access to file transfer systems
  3. Potentially execute arbitrary code
  4. Access sensitive data
  5. Use the system as a pivot point for further attacks

Current Status

  • Exploitation Status: Actively exploited in ransomware campaigns.3
  • Detection: Added to CISA's Known Exploited Vulnerabilities catalog on April 7, 2025.3
  • Mitigation: Immediate patching required.4

Technical Details

The vulnerability exists in the way CrushFTP handles S3-style authentication headers.2 Specifically:

  1. The system incorrectly accepts the "crushadmin/" credential as valid without proper password verification.2
  2. Attackers can exploit this by:
    • Using a spoofed AWS header
    • Crafting a specific 44-character CrushAuth cookie value
    • Manipulating the c2f parameter

What You Need to Do

  1. Immediate Action:

    • Update to CrushFTP version 11.2.3 or 10.8.3 immediately
    • These versions contain the security fix
  2. Detection:

    • Monitor for unauthorized access attempts
    • Check system logs for suspicious activity
    • Implement network monitoring for exploitation attempts
  3. Prevention:

    • Apply the security update as soon as possible
    • Consider disabling S3 protocol if not needed
    • Implement additional authentication layers
    • Regularly audit system access logs

Timeline

  • March 26, 2025: NVD publishes vulnerability details.1
  • March 26, 2025: CrushFTP releases security updates.4
  • March 27, 2025: Security advisories begin circulating.2
  • March 28, 2025: ProjectDiscovery publishes detailed analysis.2
  • April 7, 2025: CISA adds to KEV catalog.3
  • April 13, 2025: Widespread exploitation confirmed.3

Final Thoughts

The rapid exploitation of CVE-2025-31161 highlights the critical importance of timely patch management and vigilant monitoring for all organizations running file transfer solutions.

With this vulnerability actively leveraged in ransomware campaigns and officially recognized by CISA and NIST, it is essential to prioritize immediate upgrades to the fixed CrushFTP versions (11.2.3 or 10.8.3) and to review system logs for any signs of compromise.

Ongoing awareness of vendor advisories and authoritative threat intelligence sources remains vital for maintaining a strong security posture. For further technical details and remediation guidance, consult the official advisories and the resources cited below.

Footnotes

  1. NIST NVD: CVE-2025-31161 2 3

  2. ProjectDiscovery: CrushFTP Authentication Bypass - CVE-2025-31161 2 3 4 5 6

  3. CISA Known Exploited Vulnerabilities Catalog 2 3 4

  4. CrushFTP Security Advisory/Changelog 2