PT-2025-38495 · Fortra · Goanywhere Mft

Published

2025-09-11

·

Updated

2026-04-07

·

CVE-2025-10035

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Fortra GoAnywhere MFT versions prior to 7.8.4 and prior to 7.6.3.
Description Fortra GoAnywhere MFT contains a critical deserialization vulnerability in the License Servlet (CVE-2025-10035). This vulnerability allows a remote, unauthenticated attacker to deserialize an arbitrary object controlled by the attacker, potentially leading to remote code execution. The vulnerability has been actively exploited by the Storm-1175 threat actor, associated with the Medusa ransomware group, since September 10, 2025, prior to the public disclosure on September 18, 2025. Exploitation involves bypassing authentication and deploying malicious payloads. Approximately 20,000 instances are estimated to be exposed. The vulnerability allows for remote code execution and potential data exfiltration.
Recommendations Update Fortra GoAnywhere MFT to version 7.8.4 or 7.6.3. Restrict access to the Admin Console to mitigate the risk.

Exploit

Fix

RCE

Command Injection

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

BDU:2025-11633
CVE-2025-10035

Affected Products

Goanywhere Mft