PT-2025-38495 · Fortra · Goanywhere Mft
Published
2025-09-11
·
Updated
2026-04-07
·
CVE-2025-10035
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Fortra GoAnywhere MFT versions prior to 7.8.4 and prior to 7.6.3.
Description
Fortra GoAnywhere MFT contains a critical deserialization vulnerability in the License Servlet (CVE-2025-10035). This vulnerability allows a remote, unauthenticated attacker to deserialize an arbitrary object controlled by the attacker, potentially leading to remote code execution. The vulnerability has been actively exploited by the Storm-1175 threat actor, associated with the Medusa ransomware group, since September 10, 2025, prior to the public disclosure on September 18, 2025. Exploitation involves bypassing authentication and deploying malicious payloads. Approximately 20,000 instances are estimated to be exposed. The vulnerability allows for remote code execution and potential data exfiltration.
Recommendations
Update Fortra GoAnywhere MFT to version 7.8.4 or 7.6.3. Restrict access to the Admin Console to mitigate the risk.
Exploit
Fix
RCE
Command Injection
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Goanywhere Mft