Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63419 PoC — CrushFTP 安全漏洞

Source
Associated Vulnerability
Title:CrushFTP 安全漏洞 (CVE-2025-63419)
Description:Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitations leading to HTML Injection.
Description
CrushFTP before 11.3.7_60 is vulnerable to HTML Injection. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitzations leading to HTML Injection.
Readme
# CVE-2025-63419

CrushFTP before 11.3.7_60 is vulnerable to HTML Injection. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitzations leading to HTML Injection.

# CWE

CWE-79 — Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)

# CVSS v3.1 Base Score: 3.5 (Low)

```bash
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
```

# Summary

The CrushFTP Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitzations leading to HTMLi, While the feature intentionally supports limited HTML code usage, lack of sanitzations makes this injection unintentional and poses a low integrity impact.

# Steps to reproduce

1. Navigate to http://127.0.0.1:8080/
2. Select a file ( Just incase there are no files an attacker must upload one and then proceed with the other steps )
3. Click on "Rename" and rename the file to:
```html
test<h1>HACKED</h1>test.txt
```

![Rename](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/image.png)
![Rename-2](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/Nuclei-templates/image.png)

4. Select the file 
5. Click on "Share" and observe the unintentional HTMLi:

![Share](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/Nuclei-templates/Fiserv/image.png)
![HTMLi](https://raw.githubusercontent.com/MMAKINGDOM/1/refs/heads/main/Nuclei-templates/CISA/image.png)

# Credit

Muntadhar M. Ahmed ([almuntadhar0x01](https://almuntadhar0x01.me/)
File Snapshot

[4.0K] /data/pocs/4d2349c1eb5949eac73c8d9146edb08d42269c98 └── [1.6K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →