{"vulnerability": "CVE-2025-32102", "sightings": [{"uuid": "4be989b6-48cf-4fd8-8c33-775bffe9eaed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lmpolytmar2r", "content": "", "creation_timestamp": "2025-04-13T18:31:15.015416Z"}, {"uuid": "f592d800-1732-4be8-bdc2-a31c22ce1140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114332086226987435", "content": "", "creation_timestamp": "2025-04-13T18:33:10.203154Z"}, {"uuid": "7a4ee791-642d-4eb8-a87c-a6d32ebfbf2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lmppolswya26", "content": "", "creation_timestamp": "2025-04-13T18:50:35.863785Z"}, {"uuid": "baba16c8-2b39-4516-8a64-99e0d2e8c1cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmq3yn5tmz2z", "content": "", "creation_timestamp": "2025-04-13T22:30:57.088984Z"}, {"uuid": "efc2472a-fd9b-4571-8d2b-ffc07a973376", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmscuwbqm22x", "content": "", "creation_timestamp": "2025-04-14T19:39:29.003427Z"}, {"uuid": "799acd18-e0b5-45e0-b490-e70e31e8bdbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lmthoujivk2h", "content": "", "creation_timestamp": "2025-04-15T06:38:15.985820Z"}, {"uuid": "a96c8838-2bc8-468f-84a5-26dfaf3058e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmtmlrhqge2t", "content": "", "creation_timestamp": "2025-04-15T08:05:58.350591Z"}, {"uuid": "38a88b37-1c80-486f-be66-d5be4cf1c6c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmujatqeuy2q", "content": "", "creation_timestamp": "2025-04-15T16:38:55.127580Z"}, {"uuid": "bab0a35a-b676-4ed1-bf12-050fa573f242", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmxdsfj2xs2c", "content": "", "creation_timestamp": "2025-04-16T19:39:18.847978Z"}, {"uuid": "f3b7c36e-bfe9-4e31-98c4-fdc09a16c6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigyfduc27", "content": "", "creation_timestamp": "2025-04-16T21:02:22.633738Z"}, {"uuid": "621b5377-11da-46fa-b59a-f1292ca1bfcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114604601719249667", "content": "", "creation_timestamp": "2025-05-31T21:37:24.617570Z"}, {"uuid": "1763886e-6a5f-4c6d-8469-19d87db9d90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m4jernm2nq2f", "content": "", "creation_timestamp": "2025-10-31T21:02:50.041402Z"}, {"uuid": "2f685b44-511f-44b2-ba95-22a82b364ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "5233bd1a-5433-47e8-b923-f2d392339a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:42.000000Z"}, {"uuid": "5922951c-978a-4f0e-8f16-b38e7ae24899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11784", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32102\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T12:36:27.306Z\n\ud83d\udd17 References:\n1. https://www.crushftp.com/\n2. https://www.crushftp.com/download/\n3. https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-04-15T12:54:25.000000Z"}, {"uuid": "fe9b2301-484c-44fb-b143-5d7c4713bdc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "published-proof-of-concept", "source": "Telegram/nolm0rIyXvh0VaRouLmMJT-1_OzPIsfSh-28ANnb3cfZ3VI", "content": "", "creation_timestamp": "2025-05-21T07:05:59.000000Z"}, {"uuid": "3ffdcab1-1f84-4ab7-a74e-fa23e7a77eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "published-proof-of-concept", "source": "Telegram/RcLFAo6jOer1k-VS2nA4Md0lDrYUPyjSKu6Fbc19Yb_ozIY", "content": "", "creation_timestamp": "2025-05-20T07:24:57.000000Z"}, {"uuid": "b7b9fc32-1a50-411e-842e-920cc1fa9e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17737", "content": "\ud83d\udea8CVE-2025-32102 &amp; CVE-2025-32103: CrushFTP Server-Side Request Forgery (SSRF) and Directory Traversal\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJDcnVzaEZUUCI%3D\n\nFOFA Query: app=\"CrushFTP\"\n\nResults: 342,867\n\nDisclosure: https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-05-31T22:34:47.000000Z"}, {"uuid": "90aa7004-5ad5-4d82-a1af-f73e1d7149f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "seen", "source": "https://t.me/cvedetector/22960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32102 - CrushFTP SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32102 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:40.000000Z"}, {"uuid": "1f556361-e34d-4480-917b-127aeccacf15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32102", "type": "exploited", "source": "https://t.me/jj_8tl/408", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/OkzA9zFYq2\n\n\ud83d\udea8\ud83d\udea8CrushFTP Under Attack! \nCVE-2025-32102: SSRF alert! Attackers can exploit weak host/port validation to hijack requests.\nCVE-2025-32103: Directory traversal flaw exposes remote files to unauthorized access.  \n\ud83d\udd25PoC: https://t.co/ZUcRl7qA7m\n\nZoomEye Dork\ud83d\udc49app=\"CrushFTP\"\nReveals 71k+ vulnerable instances!  \nZoomEye Link: https://t.co/KBmxsCTUFo\nSHODAN Dork\ud83d\udc49server: CrushFTP HTTP Server\n\nRefer: https://t.co/5PLZhC5A6c\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-15T03:57:35.000000Z"}]}