This is version . It is not the current version, and thus it cannot be edited.
[Back to current version]   [Restore this version]

July 18th there is a 0-day exploit in the wild.

Hackers apparently reverse engineered out code and found some bug we had, which we had already fixed, and are exploiting it for anyone who has not stayed up to date.

We believe this bug was in builds prior to July 1st time period roughly...we are not fully certain of the exact bug that is being exploited, but it appears the latest versions of CrushFTP already have the issue patched.

As always we recommend regularly and frequent patching.

We don't believe people with a DMZ CrushFTP in front of their main are affected by this.

If you were exploited:#

restore a prior default user from your backup folder from before the exploit. CrushFTP folder/backup/users/MainUsers/default.....

These zip files cannot be extracted with native windows unzip and need winrar or macos or winzip etc to extract them.

Restore it to your CrushFTP folder/users/MainUsers/default

Add new attachment

Only authorized users are allowed to upload new attachments.
« This particular version was published on 18-Jul-2025 11:33 by Ben Spink.
G’day (anonymous guest)
CrushFTP11 | What's New

Referenced by
Update

JSPWiki