A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/
https://www.helpnetsecurity.com/2025/09/22/fortra-goanywhere-vulnerability-cve-2025-10035/
https://www.theregister.com/2025/09/19/gortra_goanywhere_bug/
https://www.darkreading.com/cyberattacks-data-breaches/patch-fortra-goanywhere-bug-command-injection
https://thehackernews.com/2025/09/fortra-releases-critical-patch-for-cvss.html
https://cyberscoop.com/goanywhere-file-transfer-service-vulnerability-september-2025/
Published: 2025-09-18
Updated: 2025-09-19
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 10
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00231
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored