Metrics
Affected Vendors & Products
Solution
Upgrade to a patched version (the latest release 7.8.4, or the Sustain Release 7.6.3)
Workaround
Immediately ensure that access to the GoAnywhere Admin Console is not open to the public. Exploitation of this vulnerability is highly dependent upon systems being externally exposed to the internet.
Thu, 18 Sep 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 18 Sep 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 18 Sep 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. | |
Title | Deserialization Vulnerability in GoAnywhere MFT's License Servlet | |
Weaknesses | CWE-502 CWE-77 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2025-09-18T22:43:41.684Z
Reserved: 2025-09-05T16:43:32.877Z
Link: CVE-2025-10035

No data.

Status : Received
Published: 2025-09-18T22:15:41.857
Modified: 2025-09-18T23:15:34.043
Link: CVE-2025-10035

No data.

No data.