Unrated severityCISA KEVNVD Advisory· Published Apr 22, 2024· Updated Oct 21, 2025
Unauthenticated arbitrary file read and remote code execution in CrushFTP
CVE-2024-4040
Description
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
Affected products
1- CrushFTP/CrushFTPv5Range: 10.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.crushftp.com/crush10wiki/Wiki.jspmitrevendor-advisory
- www.crushftp.com/crush11wiki/Wiki.jspmitrevendor-advisory
- www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/mitrethird-party-advisory
- www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/mitrethird-party-advisory
- www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/mitremedia-coverage
- www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/mitrerelated
News mentions
0No linked articles in our index yet.