Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55057: Multiple CWE-352 Cross-Site Request Forgery (CSRF) in Rumpus FTP Server

0
Medium
VulnerabilityCVE-2025-55057cvecve-2025-55057cwe-352
Published: Mon Nov 17 2025 (11/17/2025, 17:31:23 UTC)
Source: CVE Database V5
Vendor/Project: Rumpus
Product: FTP Server

Description

Multiple CWE-352 Cross-Site Request Forgery (CSRF)

AI-Powered Analysis

AILast updated: 11/24/2025, 18:30:16 UTC

Technical Analysis

CVE-2025-55057 identifies multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Rumpus FTP Server version 9.0.12. CSRF is a web security weakness where an attacker tricks an authenticated user into submitting unintended requests to a web application, causing unauthorized actions. In this case, the vulnerability affects the FTP server's web management interface, allowing an attacker to craft malicious web requests that, when executed by a logged-in user with high privileges, can alter server configurations or execute commands without the user's explicit consent. The CVSS 3.1 base score is 4.5 (medium), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R). The impact is limited to integrity (I:H) with no confidentiality (C:N) or availability (A:N) impact. No patches are currently published, and no exploits have been observed in the wild. The vulnerability was reserved in August 2025 and published in November 2025. The lack of confidentiality and availability impact reduces the severity, but the ability to manipulate server settings or commands can lead to significant operational risks if exploited. The vulnerability is categorized under CWE-352, a common web security issue. Organizations using Rumpus FTP Server 9.0.12 should monitor for vendor patches and implement interim mitigations to reduce risk.

Potential Impact

For European organizations, the primary impact of CVE-2025-55057 lies in the potential unauthorized modification of FTP server configurations or execution of commands, which compromises the integrity of the affected systems. This can lead to unauthorized changes in file access permissions, user management, or server behavior, potentially disrupting business processes or enabling further attacks. Although confidentiality and availability are not directly affected, integrity violations can facilitate lateral movement or data tampering. Organizations relying on Rumpus FTP Server for critical file transfers or internal workflows may experience operational disruptions or compliance issues if the server is manipulated. The requirement for authenticated users with high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments with many privileged users or weak internal controls. European sectors such as finance, manufacturing, and government agencies using this FTP server could face targeted attacks aiming to alter data flows or exfiltrate sensitive information indirectly. The absence of known exploits currently provides a window for proactive defense, but the medium severity warrants timely attention.

Mitigation Recommendations

1. Monitor Rumpus vendor communications closely and apply security patches immediately upon release to address CVE-2025-55057. 2. Until patches are available, restrict access to the FTP server's web management interface to trusted networks and users only, using network segmentation and firewall rules. 3. Enforce strong authentication and session management policies to reduce the risk of session hijacking or misuse by privileged users. 4. Implement CSRF protection mechanisms such as anti-CSRF tokens and validate the origin of requests in the web interface if customization is possible. 5. Conduct regular audits of FTP server configurations and logs to detect unauthorized changes promptly. 6. Educate privileged users about the risks of CSRF attacks and encourage cautious behavior when interacting with web interfaces. 7. Consider deploying web application firewalls (WAFs) that can detect and block suspicious CSRF-related traffic patterns. 8. Limit the number of users with high privileges on the FTP server to minimize the attack surface. 9. Use multi-factor authentication (MFA) for administrative access to the FTP server to add an additional security layer. 10. Review and update incident response plans to include scenarios involving FTP server integrity breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:06:54.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5ce0c08982598af07849

Added to database: 11/17/2025, 5:35:28 PM

Last enriched: 11/24/2025, 6:30:16 PM

Last updated: 1/7/2026, 8:46:03 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats