Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63420: n/a

0
Medium
VulnerabilityCVE-2025-63420cvecve-2025-63420
Published: Fri Nov 07 2025 (11/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CrushFTP11 before 11.3.7_57 is vulnerable to stored HTML injection in the CrushFTP Admin Panel (Reports / "Who Created Folder"), enabling persistent HTML execution in admin sessions.

AI-Powered Analysis

AILast updated: 11/14/2025, 22:32:40 UTC

Technical Analysis

CVE-2025-63420 identifies a stored HTML injection vulnerability in CrushFTP version 11 prior to 11.3.7_57. The flaw exists in the Admin Panel, specifically within the Reports feature under the 'Who Created Folder' section. An attacker with at least limited privileges (PR:L) can inject malicious HTML content that is persistently stored and executed in the context of administrator sessions when they access the report. This persistent injection can lead to unauthorized script execution, potentially enabling actions such as session hijacking, UI manipulation, or phishing within the admin interface. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating inadequate sanitization of user input before rendering in the web interface. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N) shows that the attack is network exploitable with low attack complexity, requires privileges and user interaction, and impacts the integrity of the system with a scope change (S:C) due to the potential to affect other components or sessions. No known public exploits have been reported, but the vulnerability poses a risk to administrative control and trustworthiness of the CrushFTP management console. The lack of a patch link suggests that organizations should monitor vendor updates closely and apply fixes promptly once available.

Potential Impact

For European organizations, this vulnerability could undermine the integrity of administrative operations on CrushFTP servers, potentially allowing attackers to inject malicious HTML that executes in admin sessions. This could lead to unauthorized actions such as manipulation of administrative data, session hijacking, or delivery of malicious payloads through the admin interface. While confidentiality and availability are not directly impacted, the integrity compromise could facilitate further attacks or unauthorized changes to file transfer configurations. Organizations relying on CrushFTP for critical file transfer operations, especially those handling sensitive or regulated data, may face increased risk of administrative compromise. The requirement for privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple administrators or where insider threats exist. The medium severity rating suggests a moderate but non-trivial risk that should be addressed to maintain secure operations.

Mitigation Recommendations

1. Immediately upgrade CrushFTP to version 11.3.7_57 or later once the patch is available to remediate the vulnerability. 2. Until a patch is applied, restrict access to the CrushFTP Admin Panel to trusted administrators only and enforce strict access controls and network segmentation to limit exposure. 3. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials being exploited. 4. Regularly audit and monitor admin panel activity logs for unusual or unauthorized actions that could indicate exploitation attempts. 5. Educate administrators about the risks of interacting with untrusted input or reports and encourage cautious behavior when reviewing report data. 6. Employ web application firewalls (WAF) with custom rules to detect and block suspicious HTML or script injection attempts targeting the admin interface. 7. Conduct periodic security assessments and penetration testing focused on the admin panel to identify and remediate similar injection flaws proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690e653fde4eb1b9f756d67e

Added to database: 11/7/2025, 9:31:43 PM

Last enriched: 11/14/2025, 10:32:40 PM

Last updated: 12/23/2025, 5:58:41 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats