CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild.
The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has been fixed in versions 10.8.4 and 11.3.1.
"CrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise," CISA said in an advisory.
The shortcoming has been assigned the CVE identifier CVE-2025-31161 (CVSS score: 9.8). It bears noting that the same vulnerability was previously tracked as CVE-2025-2825, which has now been marked Rejected in the CVE list.
The development comes after the disclosure process associated with the flaw has been entangled in controversy and confusion, with VulnCheck – due to it being a CVE Numbering Authority (CNA) – assigned an identifier (i.e., CVE-2025-2825), while the actual CVE (i.e., CVE-2025-31161) had been pending.
Outpost24, which is credited with responsibly disclosing the flaw to the vendor, has stepped in to clarify that it requested a CVE number from MITRE on March 13, 2025, and that it was coordinating with CrushFTP to ensure that the fixes were rolled out within a 90-day disclosure period.
However, it wasn't until March 27 that MITRE assigned the flaw the CVE CVE-2025-31161, by which time VulnCheck had released a CVE of its own without contacting "CrushFTP or Outpost24 beforehand to see if a responsible disclosure process was already underway."
VulnCheck, for its part, has criticized MITRE for rejecting CVE-2024-2825 and publishing CVE-2025-31161 instead, while also accusing CrushFTP of attempting to cover up the vulnerability.
"CrushFTP, LLC released an advisory but deliberately requested that a CVE not be issued for 90-days, effectively trying to hide the vulnerability from the security community and defenders," VulnCheck security researcher Patrick Garrity said in a post on LinkedIn.
"What's worse is that MITRE appears to have prioritized their involvement in the write-up over the timely disclosure of a vulnerability that was actively being exploited in the wild. This sets a dangerous precedent."
The Swedish cybersecurity company has since released step-by-step instructions to trigger the exploit without sharing much of the technical specifics -
Generate a random alphanumeric session token of a minimum 31 characters of length
Set a cookie called CrushAuth to the value generated in step 1
Set a cookie called currentAuth to the last 4 characters of the value generated in step 1
Perform an HTTP GET request to the target /WebInterface/function/ with the cookies from steps 2 and 3, as well as an Authorization header set to "AWS4-HMAC=