Fortra has disclosed particulars of a crucial security flaw in GoAnywhere Managed File Switch (MFT) software program that might outcome within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, presumably resulting in command injection,” Fortra mentioned in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability depends on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard towards potential threats. If quick patching is just not potential, it is advisable to make sure that entry to the GoAnywhere Admin Console is just not open to the general public.

Fortra makes no point out of the flaw being exploited within the wild. That mentioned, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) had been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final yr, it addressed one other crucial vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that might have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT resolution impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive menace intelligence at watchTowr, mentioned in an announcement shared with The Hacker Information.
“With hundreds of GoAnywhere MFT cases uncovered to the Web, this concern is nearly sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these programs are typically Web-facing by design, so organizations ought to assume they’re susceptible. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”



