CVE-2025-31161

CRITICAL KEV RANSOMWARE NUCLEI

CrushFTP - Authentication Bypass

Title source: nuclei

Description

CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to login_user_pass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username, which triggers the successful anypass authentication process, but the server will fail to find the expected SignedHeaders entry, resulting in an index-out-of-bounds error that stops the code from reaching the session cleanup. Together, these issues make it trivial to authenticate as any known or guessable user (e.g., crushadmin), and can lead to a full compromise of the system by obtaining an administrative account.

Exploits (24)

nomisec WORKING POC 49 stars
by Immersive-Labs-Sec · remote
https://github.com/Immersive-Labs-Sec/CVE-2025-31161
github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/CrushFtp-CVE-2025-31161-AuthenticationBypass-poc.py
github WORKING POC 12 stars
by ghostsec420 · pythonremote
https://github.com/ghostsec420/ShatteredFTP
nomisec WORKING POC 5 stars
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2025-31161
github WORKING POC 2 stars
by cesarbtakeda · cpoc
https://github.com/cesarbtakeda/CVE-2025-31161
nomisec WORKING POC 2 stars
by TX-One · remote
https://github.com/TX-One/CVE-2025-31161
nomisec WORKING POC 2 stars
by ibrahmsql · remote
https://github.com/ibrahmsql/CVE-2025-31161
nomisec WORKING POC 2 stars
by f4dee-backup · remote
https://github.com/f4dee-backup/CVE-2025-31161
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-31161
nomisec WORKING POC 1 stars
by Dairrow · remote
https://github.com/Dairrow/CVE-2025-31161
nomisec WORKING POC 1 stars
by ch3m1cl · poc
https://github.com/ch3m1cl/CVE-2025-31161
nomisec SCANNER 1 stars
by SUPRAAA-1337 · remote
https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
nomisec WORKING POC
by eserror · remote
https://github.com/eserror/CVE-2025-31161
nomisec WORKING POC
by Drelinss · poc
https://github.com/Drelinss/Blackash-CVE-2025-31161
nomisec SCANNER
by Teexo · poc
https://github.com/Teexo/CVE-2025-31161
nomisec WORKING POC
by 0xDTC · remote
https://github.com/0xDTC/CrushFTP-auth-bypass-CVE-2025-31161
nomisec WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2025-31161
nomisec WRITEUP
by acan0007 · poc
https://github.com/acan0007/CVE-2025-31161
nomisec WORKING POC
by Shisones · poc
https://github.com/Shisones/CVE-2025-31161
nomisec SCANNER
by SUPRAAA-1337 · remote
https://github.com/SUPRAAA-1337/CVE-2025-31161_exploit
exploitdb WORKING POC
by İbrahimsql · pythonremotemultiple
https://www.exploit-db.com/exploits/52295
vulncheck_xdb WORKING POC
remote
https://github.com/ch3m1calspain/CVE-2025-31161

Nuclei Templates (1)

CrushFTP - Authentication Bypass
CRITICALby parthmalhotra,Ice3man,DhiyaneshDk,pdresearch,whattheslime
Shodan: http.title:"CrushFTP WebInterface" || http.favicon.hash:-1022206565 || http.html:"crushftp"
FOFA: icon_hash="-1022206565" || title="CrushFTP WebInterface" || body="crushftp"

Scores

CVSS v3 9.8
EPSS 0.8729
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-04-07
VulnCheck KEV 2024-04-26
ENISA EUVD EUVD-2025-9910
Ransomware Use Confirmed

Classification

CWE
CWE-305
Status published

Affected Products (1)

crushftp/crushftp < 10.8.4

Timeline

Published Apr 03, 2025
KEV Added Apr 07, 2025
Tracked Since Feb 18, 2026