CrowdSec
10/10CrowdSec Score

Monsta FTP - RCE (CVE-2025-34299)

Published on07-11-2025
First seen on26-11-2025

2Exploiting IPs reported

Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.

CrowdSec analysis

CVE-2025-34299 is a critical vulnerability in Monsta FTP versions 2.11 and earlier that allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution. Exploiting this flaw, threat actors can compromise the server by uploading malicious files from a rogue (S)FTP server, making it a significant risk for web-based file management environments.

CrowdSec has been tracking this vulnerability and its exploits since 12th of November 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2025-34299 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2025-34299 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2025-34299 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit Monsta FTP by sending crafted POST requests to /mftp/application/api/api.php with malicious SFTP connection parameters, enabling remote file writes and potential code execution on the server.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.