{"vulnerability": "CVE-2025-32103", "sightings": [{"uuid": "4bfdfc19-68d2-403c-a603-664925d46e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmscuwbqm22x", "content": "", "creation_timestamp": "2025-04-14T19:39:29.078135Z"}, {"uuid": "dd0b3711-dce1-4641-8007-4534b56e2955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lmpolytmar2r", "content": "", "creation_timestamp": "2025-04-13T18:31:15.106832Z"}, {"uuid": "9fc184ad-9ba8-412b-8847-cafdd5da0c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114332086226987435", "content": "", "creation_timestamp": "2025-04-13T18:33:10.256597Z"}, {"uuid": "ae64f874-ad70-4355-85bc-831e632d354f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lmppolswya26", "content": "", "creation_timestamp": "2025-04-13T18:50:36.004965Z"}, {"uuid": "30993ef5-45a3-4cfd-a9f3-1d5a4997effa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmq3yn5tmz2z", "content": "", "creation_timestamp": "2025-04-13T22:30:57.192811Z"}, {"uuid": "0f267079-bdd1-4273-b427-ccb4dece4901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmtmlrhqge2t", "content": "", "creation_timestamp": "2025-04-15T08:05:58.443285Z"}, {"uuid": "1266218b-e75d-45f3-a9fd-f3d8872cfdb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmxdsfj2xs2c", "content": "", "creation_timestamp": "2025-04-16T19:39:18.926887Z"}, {"uuid": "51242610-615f-4ba0-b516-24fe5ba320ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmujat67fg2z", "content": "", "creation_timestamp": "2025-04-15T16:38:52.268947Z"}, {"uuid": "76b30a1a-78cd-4aa0-8b86-aa827efadb7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:57.000000Z"}, {"uuid": "07cb5aad-ed12-4e99-8d17-f3e5ae2294f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigyhtwm2y", "content": "", "creation_timestamp": "2025-04-16T21:02:23.091866Z"}, {"uuid": "4a760384-f21b-4375-ba8c-f4e52a763cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114604601719249667", "content": "", "creation_timestamp": "2025-05-31T21:37:24.724803Z"}, {"uuid": "1f32223c-1af0-43fe-aebf-c077aef01a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17737", "content": "\ud83d\udea8CVE-2025-32102 &amp; CVE-2025-32103: CrushFTP Server-Side Request Forgery (SSRF) and Directory Traversal\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJDcnVzaEZUUCI%3D\n\nFOFA Query: app=\"CrushFTP\"\n\nResults: 342,867\n\nDisclosure: https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-05-31T22:34:47.000000Z"}, {"uuid": "c71ac367-2110-4931-b2b7-403096843123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:42.000000Z"}, {"uuid": "fedb928b-fbeb-444f-b3e7-26680c884bde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32103\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T12:37:10.601Z\n\ud83d\udd17 References:\n1. https://www.crushftp.com/\n2. https://www.crushftp.com/download/\n3. https://seclists.org/fulldisclosure/2025/Apr/17", "creation_timestamp": "2025-04-15T12:54:24.000000Z"}, {"uuid": "78c43b6b-4744-4a5c-9589-a126f67f6926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "seen", "source": "https://t.me/cvedetector/22961", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32103 - CrushFTP SMB Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32103 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:40.000000Z"}, {"uuid": "c6636c95-7bb9-40ea-9734-428a8d9e3019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32103", "type": "exploited", "source": "https://t.me/jj_8tl/408", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/OkzA9zFYq2\n\n\ud83d\udea8\ud83d\udea8CrushFTP Under Attack! \nCVE-2025-32102: SSRF alert! Attackers can exploit weak host/port validation to hijack requests.\nCVE-2025-32103: Directory traversal flaw exposes remote files to unauthorized access.  \n\ud83d\udd25PoC: https://t.co/ZUcRl7qA7m\n\nZoomEye Dork\ud83d\udc49app=\"CrushFTP\"\nReveals 71k+ vulnerable instances!  \nZoomEye Link: https://t.co/KBmxsCTUFo\nSHODAN Dork\ud83d\udc49server: CrushFTP HTTP Server\n\nRefer: https://t.co/5PLZhC5A6c\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-15T03:57:35.000000Z"}]}