CVE-2025-32103
CrushFTP 9.x / 10.8.4 / 11.3.1 Server-Side Request Forgery / Directory Traversal
Severity Score
5.0
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions.
CrushFTP versions 9.x, 10.x through 10.8.4, and 11.x through 11.3.1 suffer from server-side request forgery and directory traversal vulnerabilities.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-04-04 CVE Reserved
- 2025-04-14 CVE Published
- 2025-04-16 CVE Updated
- 2025-04-16 EPSS Updated
- 2025-04-16 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-40: Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
CAPEC
References (3)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
CrushFTP Search vendor "CrushFTP" | CrushFTP Search vendor "CrushFTP" for product "CrushFTP" | >= 9.0.0 <= 10.8.4 Search vendor "CrushFTP" for product "CrushFTP" and version " >= 9.0.0 <= 10.8.4" | en |
Affected
| ||||||
CrushFTP Search vendor "CrushFTP" | CrushFTP Search vendor "CrushFTP" for product "CrushFTP" | >= 11.0.0 <= 11.3.1 Search vendor "CrushFTP" for product "CrushFTP" and version " >= 11.0.0 <= 11.3.1" | en |
Affected
|