- Description
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
- Source
- 430a6cef-dc26-47e3-9fa8-52fb7f19644e
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- CrushFTP VFS Sandbox Escape Vulnerability
- Exploit added on
- Apr 24, 2024
- Exploit action due
- May 1, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
Threat Alert: CVE-2025-2825: Unauthenticated HTTP(S) port access on CrushFTPv10-v11 CVE-2024-4040 Severity: 🔴 High Maturity: 💥 Mainstream Learn more: https://t.co/WswOdXmMW4 #CyberSecurity #ThreatIntel #InfoSec (1/3)
@fletch_ai
1 Apr 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CrushFTPは、未認証アクセスの脆弱性を直ちに修正するようユーザーに警告しています。(CVE-2024-4040、CVE-2023-43177) https://t.co/5wZMea7yXf #Security #セキュリティ #ニュース
@SecureShield_
26 Mar 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-4040 as a VFS sandbox escape that permits low-privileged remote attackers to read files beyond the intended limits of the VFS Sandbox in: https://t.co/c5b4brgJIt
@linux_ly
1 Feb 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1922C854-D367-44B7-AEFB-4AEB07679E16",
"versionEndExcluding": "10.7.1",
"versionStartIncluding": "10.0.0"
},
{
"criteria": "cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4EF482D8-4F40-454D-9A92-9D6924C582E2",
"versionEndExcluding": "11.1.0",
"versionStartIncluding": "11.0.0"
}
],
"operator": "OR"
}
]
}
]