CrushFTP 10.x < 10.8.5 / 11.x < 11.3.4_23 Privilege Escalation (CVE-2025-54309)

critical Nessus Plugin ID 242340

Synopsis

The remote host is affected by a privilege escalation vulnerability.

Description

The CrushFTP application installed on the remote host is missing a vendor-supplied patch. It is, therefore, affected by a vulnerability. CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update to version 10.8.5, 11.3.4_23 or later.

See Also

http://www.nessus.org/u?20b697cf

http://www.nessus.org/u?dd44f70f

Plugin Details

Severity: Critical

ID: 242340

File Name: crushftp_cve-2025-54309.nasl

Version: 1.2

Type: local

Agent: windows, macosx, unix

Family: FTP

Published: 7/18/2025

Updated: 7/22/2025

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-54309

CVSS v3

Risk Factor: Critical

Base Score: 9

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:crushftp:crushftp

Required KB Items: installed_sw/CrushFTP

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/18/2025

Vulnerability Publication Date: 7/18/2025

CISA Known Exploited Vulnerability Due Dates: 8/12/2025

Reference Information

CVE: CVE-2025-54309