Saturday, March 29, 2025
HomeCVE/vulnerabilityCrushFTP Warns of HTTP(S) Port Vulnerability Enabling Unauthorized Access

CrushFTP Warns of HTTP(S) Port Vulnerability Enabling Unauthorized Access

Published on

SIEM as a Service

Follow Us on Google News

Both CrushFTP, a popular file transfer technology, and Next.js, a widely used React framework for building web applications, have come under scrutiny due to significant vulnerabilities.

Rapid7 has highlighted these issues, emphasizing their potential impact on data security and unauthorized access.

Overview of Vulnerabilities

Next.js Vulnerability (CVE-2025-29927): 

This critical vulnerability involves improper authorization in middleware, potentially allowing attackers to bypass security checks within Next.js applications.

However, as of March 25, 2025, there are no reported instances of this vulnerability being exploited in the wild.

  • Impact and Risk: CVE-2025-29927 arises from how middleware is handled in Next.js applications. By manipulating specific headers in requests, attackers might bypass authentication checks, though the impact is highly dependent on how individual applications configure their middleware.
  • Mitigation and Updates: To mitigate this risk, developers should assess whether their applications rely solely on Next.js middleware for authentication. If so, updating to the latest versions of Next.js (e.g., 13.5.9, 14.2.25, 15.2.3) is crucial. Additionally, if applications use back-end APIs for server-side authentication, the vulnerability may not lead to unauthorized access.

CrushFTP Vulnerability: 

Although not yet assigned a CVE number, CrushFTP has disclosed an unauthenticated HTTP(S) port access vulnerability.

This issue could allow unauthorized access to sensitive data if not addressed promptly. Unlike the Next.js vulnerability, CrushFTP has faced previous exploitation, highlighting the urgency of securing against this threat.

  • Impact and Risk: The disclosed vulnerability in CrushFTP, affecting versions 10 and 11, could allow unauthorized access via unauthenticated HTTP(S) ports. The risk is particularly concerning given CrushFTP’s past exploitation by adversaries seeking to access and exfiltrate sensitive data.
  • Mitigation and Updates: CrushFTP customers are advised to upgrade to version 11.3.1 or later to resolve this vulnerability. Implementing the DMZ function within CrushFTP can also prevent exploitation, even without the update.

Both vulnerabilities underscore the importance of proactive security measures and timely updates to safeguard against potential threats, especially in technologies that have been targeted previously, like CrushFTP.

As neither vulnerability has been reported exploited in the wild as of now, organizations and developers have a critical window to address these issues before they could be exploited by malicious actors.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...