Fortra has launched safety updates to patch a most severity vulnerability in GoAnywhere MFT’s License Servlet that may be exploited in command injection assaults.
GoAnywhere MFT is a web-based managed file switch instrument that helps organizations securely switch information and preserve audit logs of who accesses the shared information.
Tracked as CVE-2025-10035, this safety flaw is attributable to a deserialization of untrusted knowledge weak spot and will be exploited remotely in low-complexity assaults that do not require person interplay. Whereas Fortra said that the vulnerability was found over the weekend, it did not specify who reported it or whether or not the flaw has been exploited in assaults.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly cast license response signature to deserialize an arbitrary actor-controlled object, probably resulting in command injection,” the corporate mentioned in a safety advisory printed on Thursday.
“Throughout a safety test carried out September 11, 2025, we recognized that GoAnywhere prospects with an Admin Console accessible over the web may very well be susceptible to unauthorized third-party publicity,” Fortra instructed BleepingComputer at the moment. “We instantly developed a patch and supplied prospects mitigation steering to assist resolve the difficulty. Clients ought to evaluate configurations instantly and take away public entry from the Admin Console.”
The corporate has launched GoAnywhere MFT 7.8.4 and Maintain Launch 7.6.3, which embrace CVE-2025-10035 patches, and suggested IT directors who cannot instantly improve their software program to safe susceptible programs by making certain that the GoAnywhere Admin Console cannot be accessed over the web.
“Exploitation of this vulnerability is very dependent upon programs being externally uncovered to the web,” Fortra added.
Safety analysts on the nonprofit Shadowserver Basis are monitoring over 470 GoAnywhere MFT situations. Nonetheless, it’s unclear what number of of those have already been patched or have their admin console uncovered on-line.

Whereas CVE-2025-10035 has but to be tagged as actively exploited, admins are nonetheless suggested to patch their GoAnywhere MFT situations, as risk actors contemplate safe file switch options (resembling GoAnywhere MFT) a gorgeous goal as a result of they’re usually used to share delicate paperwork.
As an illustration, the Clop ransomware gang claimed that it breached over 130 organizations two years in the past by exploiting a important distant code execution flaw (CVE-2023-0669) within the GoAnywhere MFT software program in zero-day assaults.
Fortra (previously generally known as HelpSystems), the cybersecurity firm behind GoAnywhere MFT and the extensively abused Cobalt Strike risk emulation instrument, offers software program and companies to over 9,000 organizations worldwide.
Attackers have additionally exploited two Cobalt Strike vulnerabilities (CVE-2022-39197 and CVE-2022-42948), which had been added to CISA’s catalog of actively exploited safety flaws in March 2023.
Fortra says its GoAnywhere software program merchandise are utilized by over 3,000 organizations, together with dozens of Fortune 500 corporations.