CVE-2025-54309
- EPSS 50.66%
- Veröffentlicht 18.07.2025 00:00:00
- Zuletzt bearbeitet 25.09.2025 18:03:51
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
- EPSS 0.44%
- Veröffentlicht 15.04.2025 00:00:00
- Zuletzt bearbeitet 13.06.2025 12:43:22
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions.
- EPSS 0.07%
- Veröffentlicht 15.04.2025 00:00:00
- Zuletzt bearbeitet 13.06.2025 12:49:10
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.
CVE-2025-31161
- EPSS 84.41%
- Veröffentlicht 03.04.2025 00:00:00
- Zuletzt bearbeitet 21.04.2025 21:03:07
CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A r...
CVE-2025-2825
- EPSS 5.28%
- Veröffentlicht 26.03.2025 15:58:14
- Zuletzt bearbeitet 02.04.2025 21:15:33
CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames c...
CVE-2024-11986
- EPSS 0.95%
- Veröffentlicht 13.12.2024 14:15:21
- Zuletzt bearbeitet 13.12.2024 14:15:21
Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, ...
CVE-2024-53552
- EPSS 0.23%
- Veröffentlicht 10.12.2024 02:15:17
- Zuletzt bearbeitet 27.06.2025 17:58:40
CrushFTP 10 before 10.8.3 and 11 before 11.2.3 mishandles password reset, leading to account takeover.
CVE-2024-22910
- EPSS 0.37%
- Veröffentlicht 14.05.2024 14:58:26
- Zuletzt bearbeitet 13.06.2025 12:52:26
Cross Site Scripting (XSS) vulnerability in CrushFTP v.10.6.0 and v.10.5.5 allows an attacker to execute arbitrary code via a crafted payload.
- EPSS 94.43%
- Veröffentlicht 22.04.2024 20:15:07
- Zuletzt bearbeitet 27.01.2025 21:48:42
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain a...
CVE-2023-48795
- EPSS 64.06%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 29.09.2025 21:56:10
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...