Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

Posted on July 20, 2025July 20, 2025 By CWS

Jul 20, 2025Ravie LakshmananVulnerability / Menace Intelligence
A newly disclosed important safety flaw in CrushFTP has come beneath lively exploitation within the wild. Assigned the CVE identifier CVE-2025-54309, the vulnerability carries a CVSS rating of 9.0.
“CrushFTP 10 earlier than 10.8.5 and 11 earlier than 11.3.4_23, when the DMZ proxy characteristic will not be used, mishandles AS2 validation and consequently permits distant attackers to acquire admin entry by way of HTTPS,” in line with an outline of the vulnerability within the NIST’s Nationwide Vulnerability Database (NVD).
CrushFTP, in an advisory, mentioned it first detected the zero-day exploitation of the vulnerability within the wild on July 18, 2025, 9 a.m. CST, though it acknowledged that it might have been weaponized a lot earlier.

“The assault vector was HTTP(S) for the way they may exploit the server,” the corporate mentioned. “We had fastened a distinct challenge associated to AS2 in HTTP(S) not realizing {that a} prior bug might be used like this exploit was. Hackers apparently noticed our code change, and found out a method to exploit the prior bug.”
CrushFTP is broadly utilized in authorities, healthcare, and enterprise environments to handle delicate file transfers, making administrative entry particularly harmful. A compromised occasion can permit attackers to exfiltrate knowledge, inject backdoors, or pivot into inside programs that depend on the server for trusted alternate. With out DMZ isolation, the uncovered occasion turns into a single level of failure.
The corporate mentioned the unknown menace actors behind the malicious exercise managed to reverse engineer its supply code and found the brand new flaw to focus on gadgets which can be but to be up to date to the newest variations. It is believed that CVE-2025-54309 was current in CrushFTP builds previous to July 1.
CrushFTP has additionally launched the next indicators of compromise (IoCs) –

Default consumer has admin entry
Lengthy random consumer IDs created (e.g., 7a0d26089ac528941bf8cb998d97f408m)
Different new usernames created with admin entry
The file “MainUsers/default/consumer.xml” was just lately modified and has a “last_logins” worth in it
Buttons from the top consumer internet interface disappeared, and customers beforehand recognized as common customers now have an Admin button

Safety groups investigating attainable compromise ought to evaluate consumer.xml modification occasions, correlate admin login occasions with public IPs, and audit permission adjustments on high-value folders. It is also important to search for suspicious patterns in entry logs tied to newly created customers or unexplained admin position escalations, that are typical indicators of post-exploitation conduct in real-world breach situations.
As mitigations, the corporate recommends that customers restore a previous default consumer from the backup folder, in addition to evaluate add/obtain stories for any indicators of suspicious transfers. Different steps embrace –

Restrict the IP addresses used for administrative actions
Allowlist IPs that may hook up with the CrushFTP server
Change to DMZ CrushFTP occasion for enterprise use
Guarantee computerized updates are enabled

At this stage, the precise nature of the assaults exploiting the flaw will not be recognized. Earlier this April, one other safety defect in the identical resolution (CVE-2025-31161, CVSS rating: 9.8) was weaponized to ship the MeshCentral agent and different malware.
Final yr, it additionally emerged {that a} second important vulnerability impacting CrushFTP (CVE-2024-4040, CVSS rating: 9.8) was leveraged by menace actors to focus on a number of U.S. entities.
With a number of high-severity CVEs exploited over the previous yr, CrushFTP has emerged as a recurring goal in superior menace campaigns. Organizations ought to contemplate this sample as a part of broader menace publicity assessments, alongside patch cadence, third-party file switch dangers, and zero-day detection workflows involving distant entry instruments and credential compromise.

The Hacker News Tags:Access, Admin, Critical, CrushFTP, Exploit, Flaw, Gain, Hackers, Servers, Unpatched

Post navigation

Previous Post: Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards
Next Post: Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Related Posts

Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News