Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55057: Multiple CWE-352 Cross-Site Request Forgery (CSRF) in Rumpus FTP Server

0
Medium
VulnerabilityCVE-2025-55057cvecve-2025-55057cwe-352
Published: Mon Nov 17 2025 (11/17/2025, 17:31:23 UTC)
Source: CVE Database V5
Vendor/Project: Rumpus
Product: FTP Server

Description

Multiple CWE-352 Cross-Site Request Forgery (CSRF)

AI-Powered Analysis

AILast updated: 11/17/2025, 17:40:47 UTC

Technical Analysis

CVE-2025-55057 identifies multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Rumpus FTP Server version 9.0.12. CSRF (CWE-352) occurs when an attacker tricks an authenticated user into submitting unintended requests to a web application, causing the server to perform actions without the user's consent. In this case, the vulnerability affects the FTP server's web management interface or API endpoints that do not implement adequate CSRF protections such as anti-CSRF tokens or same-site request validation. The CVSS 3.1 score of 4.5 (medium severity) reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R). The impact is limited to integrity (I:H) with no confidentiality (C:N) or availability (A:N) impact. This means an attacker who can trick an authenticated administrator or privileged user into visiting a malicious page could cause unauthorized configuration changes or commands to be executed on the FTP server, potentially altering server behavior or compromising data integrity. No public exploits are known yet, and no patches have been linked, indicating the vulnerability is newly disclosed. The vulnerability was reserved in August 2025 and published in November 2025, suggesting recent discovery. The lack of patch links implies organizations must monitor vendor advisories closely. The vulnerability affects only version 9.0.12, so other versions may not be vulnerable or require separate assessment.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential unauthorized modification of FTP server configurations or data integrity compromise. Since the vulnerability requires high privileges and user interaction, the risk is mainly to administrators or users with elevated access who might be socially engineered into triggering the exploit. Successful exploitation could lead to unauthorized changes in FTP server behavior, potentially disrupting file transfers or exposing sensitive data indirectly through altered configurations. While confidentiality and availability are not directly impacted, integrity violations could undermine trust in file transfer operations, critical for sectors like finance, healthcare, and government. Organizations relying on Rumpus FTP Server 9.0.12 for internal or external file exchange must be cautious, as attackers could leverage this vulnerability to pivot within networks or disrupt workflows. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. European entities with stringent compliance requirements (e.g., GDPR) must consider the implications of integrity breaches on data protection obligations.

Mitigation Recommendations

Organizations should immediately inventory their FTP server deployments to identify any running Rumpus FTP Server version 9.0.12. Until a vendor patch is released, administrators should implement compensating controls such as restricting access to the FTP server management interface to trusted networks and users only. Enforce multi-factor authentication and minimize the number of users with high privileges to reduce the attack surface. Educate privileged users about the risks of CSRF and the importance of avoiding clicking on untrusted links or visiting suspicious websites while authenticated to the FTP server. Implement web application firewalls (WAFs) with rules to detect and block suspicious CSRF-like requests targeting the FTP server. Monitor logs for unusual configuration changes or access patterns. Once the vendor releases a patch, apply it promptly. Additionally, consider deploying network segmentation to isolate the FTP server from critical systems to limit potential lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:06:54.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5ce0c08982598af07849

Added to database: 11/17/2025, 5:35:28 PM

Last enriched: 11/17/2025, 5:40:47 PM

Last updated: 11/22/2025, 4:50:50 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats