CVE-2021-44076
CrushFTP vulnerability analysis and mitigation

Overview

A stored Cross-Site Scripting (XSS) vulnerability was discovered in CrushFTP 9 (CVE-2021-44076). The vulnerability exists in the creation of a new user through the /WebInterface/UserManager/ interface, allowing an attacker with access to the administration panel to perform Stored Cross-Site Scripting (XSS). The issue was discovered in November 2021 and was fixed in version 9.4.0_15 released in March 2022 (Nettitude Labs).

Technical details

The vulnerability stems from improper server-side validation of username data in the /WebInterface/UserManager interface. While client-side sanitization prevents the creation of usernames containing special characters, an attacker can intercept and modify traffic before the username is added to the application's backend. The main vulnerability exists in the setUserItem function inside the crushftp/server/AdminControls.class file, where no input filtering is performed on the username, allowing special characters to remain unsanitized. Additionally, no output encoding is performed when the data is displayed within the affected page (Nettitude Labs).

Impact

The XSS payload can be executed in multiple scenarios, such as when the user's page appears in the Most Visited section or when attempting to delete the user. The impact of this vulnerability can lead to theft of information such as session cookies or other sensitive data, and could potentially be exploited for privilege escalation or account takeover (Nettitude Labs).

Mitigation and workarounds

The vulnerability was fixed in CrushFTP version 9.4.0_15. Users should upgrade to this version or later to remediate the issue. For proper mitigation, the vendor implemented proper output encoding in combination with a strong content security policy (Nettitude Labs).

Additional resources


SourceThis report was generated using AI

Related CrushFTP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-54309CRITICAL9.8
  • CrushFTPCrushFTP
  • cpe:2.3:a:crushftp:crushftp
YesYesJul 18, 2025
CVE-2025-31161CRITICAL9.8
  • CrushFTPCrushFTP
  • cpe:2.3:a:crushftp:crushftp
YesYesApr 03, 2025
CVE-2024-53552CRITICAL9.8
  • CrushFTPCrushFTP
  • cpe:2.3:a:crushftp:crushftp
NoYesDec 10, 2024
CVE-2025-32103MEDIUM5
  • CrushFTPCrushFTP
  • cpe:2.3:a:crushftp:crushftp
NoNoApr 15, 2025
CVE-2025-32102MEDIUM5
  • CrushFTPCrushFTP
  • cpe:2.3:a:crushftp:crushftp
NoNoApr 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management