Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10035: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Fortra GoAnywhere MFT

0
Critical
VulnerabilityCVE-2025-10035cvecve-2025-10035cwe-77cwe-502
Published: Thu Sep 18 2025 (09/18/2025, 22:01:51 UTC)
Source: CVE Database V5
Vendor/Project: Fortra
Product: GoAnywhere MFT

Description

A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:05:53 UTC

Technical Analysis

CVE-2025-10035 is a critical vulnerability identified in Fortra's GoAnywhere Managed File Transfer (MFT) product, specifically within the License Servlet component. The flaw arises from improper deserialization of objects when processing license response signatures. An attacker capable of forging a valid license response signature can supply a maliciously crafted serialized object, which the License Servlet will deserialize without adequate validation. This leads to CWE-502 (Deserialization of Untrusted Data) and CWE-77 (Command Injection) vulnerabilities. The deserialization process allows execution of arbitrary code or commands on the underlying system, effectively enabling remote code execution without requiring authentication or user interaction. The vulnerability affects all versions of GoAnywhere MFT, as indicated by the affectedVersions field marked '0' (likely meaning all versions up to the disclosure date). The CVSS v3.1 base score is 10.0, reflecting network attack vector, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability with scope change. Although no known exploits are currently reported in the wild, the vulnerability's nature and critical severity make it a prime target for attackers. The License Servlet is a critical component responsible for license validation, and compromise here can lead to full system takeover, data exfiltration, or disruption of managed file transfer operations. Given the widespread use of GoAnywhere MFT in enterprise environments for secure file transfers, this vulnerability poses a significant risk to organizations relying on this software for sensitive data movement.

Potential Impact

The impact of CVE-2025-10035 on European organizations is severe. Exploitation allows attackers to execute arbitrary commands remotely, leading to full system compromise. This can result in unauthorized data access, data manipulation, or destruction, severely impacting confidentiality, integrity, and availability of critical managed file transfer services. Disruption of file transfer operations can affect business continuity, especially for sectors like finance, healthcare, government, and manufacturing that rely heavily on secure and reliable data exchange. The vulnerability's exploitation could also serve as a foothold for lateral movement within networks, enabling further compromise of sensitive systems. European organizations face heightened risk due to stringent data protection regulations such as GDPR, where breaches involving personal data can lead to substantial fines and reputational damage. Additionally, the critical nature of this vulnerability may attract advanced persistent threat (APT) groups targeting European critical infrastructure and enterprises. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of attacks. Consequently, the threat could lead to significant operational disruption, financial losses, and regulatory consequences across Europe.

Mitigation Recommendations

To mitigate CVE-2025-10035, European organizations should implement the following specific measures: 1) Apply security patches or updates from Fortra immediately once available, as the vulnerability resides in the License Servlet component. 2) Until patches are released, restrict network access to the License Servlet interface using firewalls or network segmentation to limit exposure to trusted management networks only. 3) Implement strict monitoring and logging of license validation requests to detect anomalous or forged license responses indicative of exploitation attempts. 4) Employ application-layer filtering or web application firewalls (WAFs) to detect and block suspicious serialized payloads targeting the License Servlet. 5) Conduct thorough security assessments and penetration testing focused on deserialization vulnerabilities within GoAnywhere MFT deployments. 6) Educate IT and security teams about the risks of deserialization flaws and the importance of validating serialized data from untrusted sources. 7) Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting command injection or unusual process executions. 8) Review and tighten access controls and credentials related to GoAnywhere MFT administration to prevent unauthorized configuration changes. These targeted actions go beyond generic advice by focusing on the vulnerability's specific attack vector and the critical License Servlet component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fortra
Date Reserved
2025-09-05T16:43:32.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cc81ade1e207df107c362d

Added to database: 9/18/2025, 10:03:25 PM

Last enriched: 10/21/2025, 8:05:53 PM

Last updated: 11/3/2025, 8:29:23 AM

Views: 210

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats