CrushFTP’s Security Slip-Up: The Vulnerabilities You Can’t Ignore!
CrushFTP’s latest versions are as secure as a screen door on a submarine! With vulnerabilities like SSRF and directory traversal, it’s one way to get your files to travel without a passport. Dive into CVE-2025-32102 and CVE-2025-32103 for all the juicy details.

Hot Take:
CrushFTP seems to be crushing it, but not in the way they intended! With vulnerabilities like SSRF and directory traversal, it appears their servers are as open as an all-you-can-eat buffet. Maybe they should consider changing their name to CrushBug? Anyway, time to patch up those holes before hackers turn your files into their next meal!
Key Points:
- CrushFTP versions 10.7.1, 11.1.0, and legacy 9.x are vulnerable to SSRF (Server-Side Request Forgery).
- These versions also suffer from directory traversal vulnerabilities.
- The vulnerabilities have been assigned CVE-2025-32102 and CVE-2025-32103.
- Hackers can exploit these vulnerabilities to access sensitive data or execute unauthorized commands.
- CrushFTP users are advised to update their software to mitigate these risks.
Already a member? Log in here