A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
https://cyberscoop.com/fortra-goanywhere-vulnerability-exploitation/
https://www.databreachtoday.com/fortra-confirms-unauthorized-activity-hit-goanywhere-mft-a-29701
https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
https://www.hipaajournal.com/critical-goanywhere-vulnerability-medusa-ransomware/
https://www.securityweek.com/fortra-goanywhere-mft-zero-day-exploited-in-ransomware-attacks/
https://www.infosecurity-magazine.com/news/microsoft-critical-goanywhere/
https://www.databreachtoday.com/medusa-ransomware-affiliates-tied-to-fortra-goanywhere-hacks-a-29665
https://www.darkreading.com/vulnerabilities-threats/medusa-ransomware-exploit-fortra-goanywhere-flaw
https://thehackernews.com/2025/10/microsoft-links-storm-1175-to.html
https://hackread.com/medusa-ransomware-goanywhere-mft-flaw-microsoft/
https://cyberscoop.com/microsoft-goanywhere-ransomware-storm-1175/
https://therecord.media/medusa-ransomware-exploited-file-transfer
https://www.securityweek.com/organizations-warned-of-exploited-sudo-vulnerability/
https://therecord.media/cisa-orders-federal-gov-patch-fortra-bug
https://thehackernews.com/2025/09/cisa-sounds-alarm-on-critical-sudo-flaw.html
https://www.theregister.com/2025/09/26/an_apts_playground_goanywhere_perfect10/
https://www.securityweek.com/recent-fortra-goanywhere-mft-vulnerability-exploited-as-zero-day/
https://www.helpnetsecurity.com/2025/09/26/fortra-goanywhere-zero-day-cve-2025-10035/
https://thehackernews.com/2025/09/fortra-goanywhere-cvss-10-flaw.html
https://cyberscoop.com/goanywhere-vulnerability-active-exploitation-september-2025/
https://labs.watchtowr.com/it-is-bad-exploitation-of-fortra-goanywhere-mft-cve-2025-10035-part-2/
https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/
https://www.helpnetsecurity.com/2025/09/22/fortra-goanywhere-vulnerability-cve-2025-10035/
https://www.theregister.com/2025/09/19/gortra_goanywhere_bug/
https://www.darkreading.com/cyberattacks-data-breaches/patch-fortra-goanywhere-bug-command-injection
https://thehackernews.com/2025/09/fortra-releases-critical-patch-for-cvss.html
https://cyberscoop.com/goanywhere-file-transfer-service-vulnerability-september-2025/
Published: 2025-09-18
Updated: 2025-10-24
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.46912
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest