Open Nav
Sign Up

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

CVE-2025-54309

Filip Dimitrov

July 22, 2025

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The flaw, caused by improper validation of AS2 (Applicability Statement 2) protocol messages when the DMZ proxy feature is disabled, affects thousands of internet-exposed file transfer servers used by government agencies, enterprises, and healthcare providers.

The vulnerability was first detected in the wild on July 18, 2025, and likely existed in CrushFTP builds prior to July 1st, 2025. Threat actors reportedly reverse-engineered recent code changes to uncover and weaponize this bug—an alarming sign of adversary sophistication.

Key Details

  • Severity: CRITICAL (CVSS 9.0)
  • Vulnerability Type: CWE-420 (Unprotected Alternate Channel)
  • Vector: HTTPS interface (when DMZ is not in use)
  • Privileges Required: None (unauthenticated)
  • Impact: Remote Code Execution → Admin Access → Full System Compromise
  • Affected Versions:
  • CrushFTP 10 before 10.8.5
  • CrushFTP 11 before 11.3.4_23

Real-World Exploitation

According to the Shadowserver Foundation, over 1,000 vulnerable CrushFTP instances remain exposed across the U.S., Canada, and Europe. Given CrushFTP’s use in handling regulated data, exploitation can lead to significant data breaches, compliance violations, and operational disruption.

Attackers have been observed modifying key configuration files (MainUsers/default/user.xml), injecting malicious admin accounts, and altering user permissions. The attack bypasses authentication altogether and does not require user interaction.

Indicators of Compromise (IOCs)

IndicatorDescription
Unknown Admin UsersPresence of newly created admin-level accounts with long, random usernames (e.g., 7a0d26089ac528941bf8cb998d97f408m)
Modified user.xmlFilesRecent changes in MainUsers/default/user.xml, particularly new or suspicious last_loginsentries
Unexpected Admin UI AccessAdmin interface buttons visible to standard or non-privileged user accounts
Suspicious Admin LoginsAdministrative login events from unfamiliar or foreign IP addresses
Permission ChangesUnexplained modifications to folder-level permissions in sensitive directories

Mitigation & Recommendations

  1. Patch Immediately
    Upgrade to:
    • v10.8.5+ (CrushFTP 10)
    • v11.3.4_23+ (CrushFTP 11)
  2. Audit for Compromise
    • Review user.xml modification timestamps
    • Search logs for unknown admin logins or access anomalies
    • Validate folder permission integrity
  3. Restrict Admin Access
    • Enforce IP allowlisting
    • Isolate admin interfaces from public exposure
  4. Use Defense-in-Depth
    While a DMZ deployment can limit exposure, we caution against relying on this as a sole mitigation. Always pair segmentation with up-to-date patching and access controls.
  5. Enable Automatic Updates
    To reduce window-of-exposure for future zero-days.

Why It Matters

CrushFTP has now seen multiple actively exploited zero-days in the past year, making it a recurring target for high-stakes data theft campaigns. Similar vulnerabilities in managed file transfer (MFT) platforms, such as MOVEit, GoAnywhere, and Accellion—have been exploited by ransomware groups like Clop for large-scale extortion.

Organizations using CrushFTP must consider this incident as a wake-up call to evaluate third-party file transfer risks, enforce patch cadence, and enhance monitoring for privileged access anomalies.

Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.