Skip to content

Urgent: CrushFTP Patches Zero-Day Vulnerability Exploited by Hackers

Hackers have been exploiting a zero-day vulnerability in CrushFTP since July 18, 2025. Update now to protect your server and data.

In the image there is a spider crawling on the web.
In the image there is a spider crawling on the web.

Urgent: CrushFTP Patches Zero-Day Vulnerability Exploited by Hackers

CrushFTP has issued an urgent security update, releasing patched versions 11.3.4_26 and 10.8.5_12 by July 18, 2025. This follows the discovery of hackers exploiting a zero-day vulnerability (CVE-2025-54309) to gain admin access via HTTPS.

The vulnerability, present in versions prior to 10.8.5 and 11.3.4_23, has been exploited since at least July 18, 2025. CrushFTP urges customers to update to the latest patched versions immediately. Users should also validate MD5 hashes via the 'About' tab to ensure no tampering or injected code.

Indicators of compromise include unusual entries in 'last_logins', recent modification dates, unknown admin users, long random usernames, missing WebInterface buttons, fake version numbers, and altered files. Review transfer logs for suspicious activity, as attackers are reusing old scripts. If exploited, users should restore a backup of the default user from before July 18, 2025, with the safest option being to restore to the July 16 state.

CrushFTP has addressed the zero-day vulnerability with the latest updates. Users are advised to update promptly, validate hashes, and monitor for signs of compromise. If affected, restore from a clean backup. No organization has been found to have released a solution for this issue as of July 18, 2025.

Read also:

Latest