CrushFTP 10/11 AS2 Validation flaw, remote admin via HTTPS
CVE-2025-54309 Published on July 18, 2025
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
Known Exploited Vulnerability
This CrushFTP Unprotected Alternate Channel Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. CrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS.
The following remediation steps are recommended / required by August 12, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Unprotected Alternate Channel
The software protects a primary channel, but it does not use the same level of protection for an alternate channel.
Products Associated with CVE-2025-54309
Want to know whenever a new CVE is published for Crushftp? stack.watch will email you.
Affected Versions
CrushFTP:- Version 10 and below 10.8.5 is affected.
- Version 11 and below 11.3.4_23 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.