top of page

Subscribe to our newsletter

CrushFTP CVE-2025-2825 Vulnerability: Critical Authentication Bypass Exploit and Mitigation Strategies

  • Rescana
  • Apr 1
  • 3 min read
Image for post about CVE-2025-2825 Vulnerability Report

Executive Summary

The CVE-2025-2825 vulnerability in CrushFTP, a multi-protocol file transfer server, presents a significant security risk. This critical authentication bypass vulnerability affects versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0, potentially allowing unauthorized access to sensitive data and systems. This report details the technical nature of the vulnerability, its exploitation, and provides guidance on mitigation strategies to safeguard your infrastructure.

Technical Information

The CVE-2025-2825 vulnerability resides in the

loginCheckHeaderAuth()
method within the
ServerSessionHTTP.java
file of CrushFTP. This method is responsible for handling HTTP requests that utilize S3-style authorization headers. The root cause of this vulnerability is the improper handling of the
lookup_user_pass
flag, which is overloaded and misused as the
anyPass
parameter in the
login_user_pass()
method. As a result, the authentication process can be bypassed when processing S3 headers that do not include a tilde in the username.

To exploit this vulnerability, an attacker can craft a malicious AWS S3-style authorization header containing a valid username. This crafted header bypasses password verification, effectively granting the attacker unauthorized access to the system. A proof of concept for this exploit involves sending an HTTP GET request with a specifically formatted authorization header and a CrushAuth cookie to trigger the vulnerability.

This flaw highlights the critical nature of parameter handling and separation of concerns within security-critical code. The improper implementation of authentication mechanisms can lead to severe breaches, underscoring the importance of rigorous code review and testing.

Exploitation in the Wild

Actors exploiting this vulnerability can gain complete access to affected servers. This access enables them to manipulate files, upload malicious content, and even create admin-level user accounts. Indicators of Compromise (IOCs) include unauthorized access logs, unexpected modifications to user accounts, and unusual file uploads.

APT Groups using this vulnerability

At present, there is no specific information about Advanced Persistent Threat (APT) groups actively exploiting CVE-2025-2825. However, given the nature of the vulnerability, it is advisable to remain vigilant for any threat actor activity targeting sectors where CrushFTP is widely deployed.

Affected Product Versions

The vulnerable versions of CrushFTP include 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. Organizations utilizing these versions are at risk and should consider immediate action to protect their systems.

Workaround and Mitigation

CrushFTP has addressed this vulnerability in version 11.3.1. The update introduces a new security parameter,

s3_auth_lookup_password_supported
, which is set to false by default. This change ensures proper password validation in the authentication workflow. Users are strongly advised to upgrade to version 11.3.1 or later without delay. Additionally, implementing network-level access controls to restrict connectivity to trusted sources further strengthens security.

For detection purposes, a Nuclei Template is available to identify vulnerable CrushFTP instances. This template attempts to exploit the authentication bypass to access the user list API and checks for a successful HTTP 200 response containing user data. The template can be accessed via this link: https://cloud.projectdiscovery.io/public/CVE-2025-2825.

References

Rescana is here for you

At Rescana, we are committed to helping our clients manage cybersecurity risks effectively. Our Third Party Risk Management (TPRM) platform provides comprehensive solutions to identify, assess, and mitigate vulnerabilities in your supply chain. Should you have any questions or require further assistance, please do not hesitate to reach out to us at ops@rescana.com. We are here to support you in navigating the complex landscape of cybersecurity threats.

bottom of page