Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8148: CWE-732 Incorrect Permission Assignment for Critical Resource in Fortra GoAnywhere MFT

0
Medium
VulnerabilityCVE-2025-8148cvecve-2025-8148cwe-732cwe-863
Published: Fri Dec 05 2025 (12/05/2025, 20:56:05 UTC)
Source: CVE Database V5
Vendor/Project: Fortra
Product: GoAnywhere MFT

Description

An Improper Access Control in the SFTP service in Fortra's GoAnywhere MFT prior to version 7.9.0 allows Web Users with an Authentication Alias and a valid SSH key but limited to Password authentication for SFTP to still login using their SSH key.

AI-Powered Analysis

AILast updated: 12/05/2025, 21:15:15 UTC

Technical Analysis

CVE-2025-8148 is an access control vulnerability identified in Fortra's GoAnywhere Managed File Transfer (MFT) product, specifically affecting the SFTP service prior to version 7.9.0. The issue arises from incorrect permission assignment related to authentication methods. Normally, web users assigned an Authentication Alias and restricted to password-based authentication for SFTP should not be able to authenticate using SSH keys. However, due to improper enforcement of access controls (CWE-732) and authorization checks (CWE-863), these users can bypass the intended restrictions and successfully log in using their SSH keys. This flaw allows an attacker with low-level privileges and a valid SSH key to escalate their access method beyond the configured policy, potentially accessing sensitive file transfer operations. The vulnerability has a CVSS 3.1 base score of 4.2, indicating medium severity, with network attack vector, high attack complexity, low privileges required, no user interaction, and limited impact on confidentiality and integrity but no impact on availability. No public exploits are known, but the vulnerability is publicly disclosed and should be addressed promptly. The root cause is improper permission assignment and insufficient authorization checks in the SFTP authentication logic, which can be mitigated by upgrading to version 7.9.0 or later where the issue is fixed.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to managed file transfer services, which are often used to handle sensitive data such as financial records, personal information, and business-critical files. Unauthorized SSH key authentication could allow attackers to bypass intended authentication restrictions, potentially leading to data leakage or unauthorized data modification. While the impact on availability is negligible, the confidentiality and integrity of transferred data could be compromised. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on GoAnywhere MFT for secure file transfers may face increased risk of data breaches or compliance violations. The medium severity rating suggests that while exploitation is not trivial, the potential consequences warrant timely remediation to avoid lateral movement or privilege escalation within internal networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade Fortra GoAnywhere MFT to version 7.9.0 or later where the access control issue is resolved. Additionally, review and audit all Authentication Alias configurations to ensure that authentication methods are properly restricted and enforced. Implement strict SSH key management policies, including key rotation and revocation procedures, to limit the risk of unauthorized key usage. Network segmentation and monitoring of SFTP access logs can help detect anomalous authentication attempts. Employ multi-factor authentication (MFA) where possible to add an additional layer of security beyond SSH keys and passwords. Regularly update and patch managed file transfer solutions as part of a robust vulnerability management program. Finally, conduct security awareness training for administrators managing authentication policies to prevent misconfigurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Fortra
Date Reserved
2025-07-24T21:27:23.294Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693347f3f88dbe026c1c0562

Added to database: 12/5/2025, 9:00:35 PM

Last enriched: 12/5/2025, 9:15:15 PM

Last updated: 12/6/2025, 3:19:49 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats