September 18 Advisory: Deserialization Vulnerability in Fortra GoAnywhere MFT Allows Command Injection [CVE-2025-10035]

Rapid Response

Vulnerability Description

CVE-2025-10035 is a deserialization vulnerability in the License Servlet of Fortra’s GoAnywhere MFT that allows an attacker with a forged license response signature to deserialize arbitrary objects, potentially leading to command injection. Exploitation requires the system to be publicly accessible, which is common for GoAnywhere MFT deployments.

Screenshot-2025-10-10-at-12.16.42-PM.png
Censys map of hosts potentially exposed to CVE-2025-10035

See the full breakdown by country in Censys Platform –> 

FieldDescription
CVE-IDCVE-2025-10035 — CVSS 10 (critical) — assigned by Fortra
Vulnerability DescriptionA deserialization vulnerability in the License Servlet of Fortra’s GoAnywhere MFT allows an attacker with a forged license response signature to deserialize arbitrary objects, potentially leading to command injection. Exploitation requires the system to be publicly accessible, which is common for GoAnywhere MFT deployments.
Date of DisclosureSeptember 18, 2025
Affected AssetsFortra GoAnywhere MFT
Vulnerable Software VersionsGoAnywhere MFT versions prior to 7.8.4 (Standard) and 7.6.3 (Sustain Release)
PoC Available?Yes — a proof of concept writeup was published by watchTowr Labs.
Exploitation StatusMicrosoft Defender researchers observed exploitation of this vulnerability in multiple organizations on September 11, 2025 that leveraged TTPs associated with Storm-1175, a cybercrime group. They stated:“Ultimately, in one compromised environment, the successful deployment of Medusa ransomware was observed.”
Patch StatusUpgrade to GoAnywhere MFT 7.8.4 or 7.6.3. If patching is not immediately possible, restrict access to the Admin Console to prevent public exposure.

Censys Perspective

At the time of writing, Censys observed 740 instances of Forta GoAnywhere MFT. Of those, only 65 reported a version number and 40 instances are running a version known to be affected by this vulnerability.  

Platform query for exposed devices:

host.services.software: (vendor: “Fortra” and product: “GoAnywhere MFT”) and not host.services.labels.value = “HONEYPOT”

Legacy Search query for exposed devices:

services.software: (vendor: “Fortra” and product: “GoAnywhere MFT”) 

ASM query for potentially vulnerable devices:

risks.name:”GoAnywhere MFT Deserialization Vulnerability [CVE-2025-10035]”

References

Subscribe to our blog