CrushFTP addressed this vulnerability in version 11.3.1 by adding a new security parameter s3_auth_lookup_password_supported set to false by default and implementing proper security checks in the authentication flow. A critical vulnerability (CVE-2025-2825) in CrushFTP, a widely used enterprise file transfer solution, allows attackers to bypass authentication and gain unauthorized server access. Security experts recommend implementing additional security measures to restrict server connections, such as strong authentication methods, regular security audits, and network-level access controls. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The core issue involves parameter overloading in the authentication system, where a flag meant for password lookup (lookup_user_pass) was reused as an authentication bypass control (anyPass). Security researchers at ProjectDiscovery documented that exploiting this vulnerability requires minimal technical knowledge. “This is a clear authentication bypass, the password check is skipped entirely,” explained researchers at ProjectDiscovery. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. ProjectDiscovery has released a Nuclei template for detecting vulnerable CrushFTP instances, allowing organizations to identify at-risk servers across their infrastructure.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 31 Mar 2025 15:15:15 +0000