CrushFTP vulnerability exploited in the wild, added to CISA KEV database


- A critical flaw was discovered in file transfer tool CrushFTP
- Experts claim the issue was being abused in the wild
- CISA added the flaw to its KEV catalog
A critical-severity vulnerability plaguing file transfer software CrushFTP was found being actively exploited in the wild.
Earlier this month, it was reported that the software, commonly used by organizations to handle large-scale file transfers, contained an authentication bypass vulnerability which allowed unauthenticated attackers to gain administrative access.
By specifically targeting the crushadmin account, threat actors could abuse the flaw to compromise the target system entirely.
CISA adds it to KEV
The flaw is now tracked as CVE-2025-31161, and was given a severity score of 9.8/10 (critical)
It affects CrushFTP versions 10 before 10.8.4 and 11 before 11.3.1. Users are strongly advised to update to these versions immediately, and if they can’t, enabling the DMZ proxy instance can serve as a temporary workaround.
Security researchers have warned that the bugs were used in the wild to install remote management tools like AnyDesk and MeshAgent, The Hacker News reported.
CISA has also picked up on the news, adding the bug to its Known Exploited Vulnerabilities Catalog (KEV). This means that Federal Civilian Executive Branch (FCEB) agencies have a three-week deadline (until April 28) to apply the patch, or stop using CrushFTP entirely.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Cybercriminals often target managed file transfer software vulnerabilities, since they could allow access to sensitive corporate files and databases. In fact, one of the most devastating cyberattacks in recent history happened in 2023, when ransomware operator Cl0p abused a previously unknown SQL injection vulnerability in MOVEit managed file transfer software to breach hundreds of corporations around the world.
A year before that, GoAnywhere MFT was breached and used to steal sensitive data from almost 130 organizations, and in January 2024, the same software was found to be vulnerable to a critical path traversal weakness flaw.
You might also like
A critical flaw was discovered in file transfer tool CrushFTP Experts claim the issue was being abused in the wild CISA added the flaw to its KEV catalog A critical-severity vulnerability plaguing file transfer software CrushFTP was found being actively exploited in the wild. Earlier this month, it was reported…
Recent Posts
- CrushFTP vulnerability exploited in the wild, added to CISA KEV database
- Hades II will launch on Switch 2 and Switch before PlayStation and Xbox
- YouTube says Nope! to age-gating Balatro videos
- Turkey wants to make it easier for authorities to block social media and messaging apps
- Most Americans don’t trust AI — or the people in charge of it
Archives
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010