Fortra has disclosed particulars of a essential safety flaw in GoAnywhere Managed File Switch (MFT) software program that would end result within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly cast license response signature to deserialize an arbitrary actor-controlled object, probably resulting in command injection,” Fortra mentioned in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability relies on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard in opposition to potential threats. If speedy patching just isn’t potential, it is advisable to make sure that entry to the GoAnywhere Admin Console just isn’t open to the general public.
Fortra makes no point out of the flaw being exploited within the wild. That mentioned, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) have been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final 12 months, it addressed one other essential vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that would have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT answer impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive menace intelligence at watchTowr, mentioned in an announcement shared with The Hacker Information.
“With hundreds of GoAnywhere MFT situations uncovered to the Web, this concern is sort of sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these methods are usually Web-facing by design, so organizations ought to assume they’re susceptible. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”