Impact
An improper session timeout in Fortra’s GoAnywhere MFT causes web users configured with SAML authentication to be redirected to the standard login page instead of the SAML login page when a session ends. This misdirects the expected single‑sign‑on flow and may allow a user or attacker to authenticate via the regular login interface. Based on the description, it is inferred that this could enable access to the application using a non‑SAML authentication path, but the vulnerability does not provide direct code execution or sensitive data exposure.
Affected Systems
All releases of Fortra:GoAnywhere MFT older than version 7.10.0 that are configured for SAML authentication.
Risk and Exploitability
The CVSS score of 4.3 indicates low‑to‑medium severity. No EPSS score is currently available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is web‑application based, inferred from the session‑timeout behavior described. Exploitation would require an attacker to observe a user’s SAML session when it times out and then use the standard login page to attempt authentication.
OpenCVE Enrichment