A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Fixes

Solution

Upgrade to a patched version (the latest release 7.8.4, or the Sustain Release 7.6.3)


Workaround

Immediately ensure that access to the GoAnywhere Admin Console is not open to the public. Exploitation of this vulnerability is highly dependent upon systems being externally exposed to the internet.

History

Thu, 18 Sep 2025 23:30:00 +0000


Thu, 18 Sep 2025 22:45:00 +0000


Thu, 18 Sep 2025 22:15:00 +0000

Type Values Removed Values Added
Description A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Title Deserialization Vulnerability in GoAnywhere MFT's License Servlet
Weaknesses CWE-502
CWE-77
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fortra

Published:

Updated: 2025-09-18T22:43:41.684Z

Reserved: 2025-09-05T16:43:32.877Z

Link: CVE-2025-10035

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-18T22:15:41.857

Modified: 2025-09-18T23:15:34.043

Link: CVE-2025-10035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.