Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63420 PoC — CrushFTP 安全漏洞

Source
Associated Vulnerability
Title:CrushFTP 安全漏洞 (CVE-2025-63420)
Description:CrushFTP是CrushFTP公司的一款文件传输服务器。 CrushFTP 11.3.7_50版本存在安全漏洞,该漏洞源于Admin Panel中Reports/Who Created Folder功能未正确处理输入,可能导致存储型跨站脚本攻击。
Description
CrushFTP11 before 11.3.7_57 is vulnerable to stored HTML injection in the CrushFTP Admin Panel (Reports / "Who Created Folder"), enabling persistent HTML execution in admin sessions.
Readme
# CVE-2025-63420

CrushFTP11 before 11.3.7_57 is vulnerable to stored HTML injection in the CrushFTP Admin Panel (Reports / "Who Created Folder"), enabling persistent HTML execution in admin sessions.

# CWE

CWE-79 — Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)

## CVSS v3.1 Base Score: 4.1 (Medium)

```bash
AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
```

# Resolved in

As noted in the vendor changelog ( https://crushftp.com/version11_build.html ) Versions 11.3.7_57 and later are not affected.
>_57:login URL fix and session kicking fix, and a **minor HTMLi for reports: CVE-2025-63420**

# Summary

A stored HTMLi vulnerability in the CrushFTP Admin Panel (Reports / 'Who Created Folder') allows authenticated attackers with permissions to create folders to inject malicious HTML codes.

# Steps to reproduce

  1. Navigate to http://127.0.0.1:8080/
  2. Create a new Folder with the following payload:
  ```html
  <h1>HACKED</h1>test
  ```

  ![CreatingFolder1](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/Nuclei-templates/crushftp1.png)
  ![CreatingFolder2](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/crushftp2.png)
  
  3. Navigate to http://127.0.0.1:8080/WebInterface/admin/index.html, Click on "Reports" and select "Who Created Folder":
  ![SelecitingReport](https://raw.githubusercontent.com/MMAKINGDOM/festivaltycooninf.lua/refs/heads/main/image.png)
  4. Click on "Run Report"
  5. Wait for the report to load, after the report is loaded, scroll down and observe the HTMLi:
  ![XSS](https://raw.githubusercontent.com/MMAKINGDOM/ThaHood/refs/heads/main/image.png) 
  6. For some UI Reasons, you might wanna create 2 folders within the same payload for the HTMLi to show.


# Credit

Muntadhar M. Ahmed ([almuntadhar0x01](https://almuntadhar0x01.me/))


File Snapshot

[4.0K] /data/pocs/ad98c56525b890a50ff755200170de25bb41d64d └── [1.8K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.