CVE-2025-10035

Published Sep 18, 2025

Last updated 5 months ago

Overview

Description
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Source
df4dee71-de3a-4139-9588-11b62fe6c0ff
NVD status
Analyzed
Products
goanywhere_managed_file_transfer

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability
Exploit added on
Sep 29, 2025
Exploit action due
Oct 20, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

df4dee71-de3a-4139-9588-11b62fe6c0ff
CWE-77
nvd@nist.gov
CWE-77

Social media

Hype score
Not currently trending
  1. It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2 #CVE202510035 #GoAnywhereMFT #InTheWildExploitation #SecurityTransparency #BackdoorAccount https://t.co/RjSb8FpG8D

    @reverseame

    11 Feb 2026

    1330 Impressions

    6 Retweets

    21 Likes

    13 Bookmarks

    0 Replies

    0 Quotes

  2. Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035) #GoAnywhereMFT #CVE202510035 #Deserialization #AuthBypass #PreAuthRCE https://t.co/l5dg2Q21iz

    @reverseame

    10 Feb 2026

    1009 Impressions

    1 Retweet

    8 Likes

    5 Bookmarks

    0 Replies

    0 Quotes

  3. Fortra Patches Critical GoAnywhere MFT Vulnerability Tracked as CVE-2025-10035 (CVSS score of 10), the critical deserialization vulnerability could be exploited for command injection. The post Fortra Patches Critical GoAnywhere MFT Vulnerability appeared first on SecurityWeek...

    @SecurityAid

    20 Jan 2026

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Actor exploiting Fortra GoAnywhere CVE-2025-10035 from 50.7.253.114 🇸🇬( FDCSERVERS ) using two different variations of the exploit VirusTotal Detections: 0/93 🟢 This IP has resolved to multiple low-reputation / throwaway domains over time https://t.co/KUy9rSH6Te

    @DefusedCyber

    9 Jan 2026

    2642 Impressions

    8 Retweets

    28 Likes

    5 Bookmarks

    1 Reply

    1 Quote

  5. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/7NJbpdGL94 #CyberSecurity #Vulnerability #CVE2025 #Ransomware #DataProtection https://t.co/ro4pBWeXDW

    @blueteamsec1

    9 Nov 2025

    1473 Impressions

    2 Retweets

    9 Likes

    1 Bookmark

    2 Replies

    0 Quotes

  6. #VulnerabilityReport #CVE202510035 CVE-2025-10035 (CVSS 10): Critical Deserialization Flaw in GoAnywhere MFT Exposes Enterprises to Remote Exploitation https://t.co/2wqWDirEKz

    @Komodosec

    25 Oct 2025

    64 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. تسريب Medusa لأكثر من 186 غيغابايت من بيانات Comcast بعد هجوم فدية يثبت أن حتى أكبر شركات التقنية ليست في مأمن. الهجوم اعتمد غالبًا على استغلال ثغرة خطيرة في أداة

    @ahmedCS0

    25 Oct 2025

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation #CISO https://t.co/gH3jF7lCqA https://t.co/Dy9jqaLvqS

    @compuchris

    22 Oct 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. Unveiling the Complete Timeline of CVE-2025-10035 Exploitation: Fortra's Journey from Detection to Patch https://t.co/JTtGjenMq0

    @bennettTechInno

    18 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Actively exploited CVE : CVE-2025-10035

    @transilienceai

    18 Oct 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. Actively exploited CVE : CVE-2025-10035

    @transilienceai

    17 Oct 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. CVE-2025-10035 - Fortra GoAnywhere MFT vulnerability https://t.co/XA108jgjAF https://t.co/H3WvxT2V3A

    @jamesboykin11

    16 Oct 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Actively exploited CVE : CVE-2025-10035

    @transilienceai

    16 Oct 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/zTSmsS0zXR Oct 10, 2025Ravie LakshmananVulnerability / Network Security Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security

    @f1tym1

    16 Oct 2025

    51 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. 1/10 ✳️ Zero-days & data leaks: this week’s Threat Analysis (Oct 7–14) Oracle EBS emergency patch #2, Salesforce ecosystem leaks, GoAnywhere CVE-2025-10035 exploitation, healthcare disclosures + EU/UK actions. Full brief 👉 https://t.co/A9EhxnzJfF

    @TrescudoCyber

    15 Oct 2025

    60 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  16. Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that's assessed to have come under active exploitation since at least September 11, 2025. https://t.co/UJncBSdwzo

    @blackwired32799

    14 Oct 2025

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚩 Microsoft Ties Storm-1175 to GoAnywhere Zero-Day & Medusa Ransomware https://t.co/O5PJ8O0dgH Microsoft says threat actor Storm-1175 has been exploiting CVE-2025-10035, a critical deserialization flaw in GoAnywhere MFT, to deploy Medusa ransomware. The exploit chain

    @Huntio

    13 Oct 2025

    2526 Impressions

    4 Retweets

    25 Likes

    8 Bookmarks

    0 Replies

    0 Quotes

  18. Actively exploited CVE : CVE-2025-10035

    @transilienceai

    13 Oct 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/KRUW50aRnz

    @PVynckier

    12 Oct 2025

    160 Impressions

    2 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 🚨 Fortra uncovers the complete journey of CVE-2025-10035 exploitation, from initial detection to the final patch. Dive into the full timeline! #Cybersecurity #Fortra ⤵️

    @xcybersecnews

    12 Oct 2025

    60 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  21. 🚨 Critical alert: CVE-2025-10035 in GoAnywhere MFT is under active exploitation! Unauthenticated remote command injection puts systems at risk of ransomware & data loss. Patch ASAP & restrict admin console access. Details: https://t.co/TMzAVz1Yrz... https://t.co/84M2pX

    @offseq

    12 Oct 2025

    81 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Actively exploited CVE : CVE-2025-10035

    @transilienceai

    11 Oct 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  23. The Zero-Day Playbook: Fortra Reveals the Critical Hour-by-Hour Timeline of CVE-2025-10035 Exploitation Read the full report on - https://t.co/JBYh9xiSlJ https://t.co/gDHejShuKe

    @cyberbivash

    10 Oct 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. CVE-2025-10035 Alert Fortra confirms active exploitation of a critical RCE flaw in GoAnywhere MFT. Linked to Storm 1175 and Medusa ransomware. Admin consoles exposed to the internet are at highest risk. Patch now (v7.6.3 or 7.8.4) and restrict public access. #CyberSecurity htt

    @CloneSystemsInc

    10 Oct 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/DnicvscCLj

    @chundefined

    10 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. The Hacker News - From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/bmOaWDPDYM

    @buzz_sec

    10 Oct 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. Check out this summarized news story 👀 Fortra Details Timeline of CVE-2025-10035 Exploitation https://t.co/Hewp7nMYsX

    @mynewswave

    10 Oct 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation https://t.co/fuv5LaBMf9 https://t.co/PuNC4XI8R5

    @RigneySec

    10 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. We've added a Fortra GoAnywhere honeypot onto Defused 🍯 GoAnywhere MFT recently dropped CVE-2025-10035 (a deserialization vulnerability) which was fairly recently added to CISA KEV For a limited time, deploy for free 👉 https://t.co/GXFaqghsXI https://t.co/zUeB7ja2p2

    @DefusedCyber

    9 Oct 2025

    5719 Impressions

    5 Retweets

    26 Likes

    5 Bookmarks

    0 Replies

    2 Quotes

  30. Microsoft links Storm-1175 to active exploitation of GoAnywhere CVE-2025-10035 — leading to Medusa ransomware attacks! https://t.co/kK1Z6w9QIM #CyberSecurity #Ransomware #Vulert #GoAnywhere #CVE202510035

    @vulert_official

    9 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 📊 The GoAnywhere CVE-2025-10035 case demonstrates supply chain blast radius perfectly. Bitsight's analysis: one vendor misses a patch, hundreds of downstream clients get exposed. The traditional TPRM questionnaire model can't catch this—you need live CTI feeds integrated in

    @the_c_protocol

    8 Oct 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨 Medusa Ransomware Exploits File Transfer Bug 🚨 Microsoft confirms that threat actors are using Medusa ransomware to exploit a critical flaw (CVE-2025-10035) for system discovery and lateral movement. Learn more → https://t.co/lXbEoxPphL #Ransomware #GoAnywhere

    @TWX_Assassins

    8 Oct 2025

    61 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. The Vulnerability Report: Ranking the Industries Most Impacted by Recent High-Severity Exploits (CVE-2025-61882, CVE-2025-10035, etc.) Read the full report on - https://t.co/37NK453Que https://t.co/ErXVQjhw6M

    @cyberbivash

    8 Oct 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. 🔒 Bugünün Siber Güvenlik Gündemi | 8 Ekim 2025 Microsoft, GoAnywhere Managed File Transfer (MFT) ürünüyle ilgili CVE-2025-10035 numaralı kritik açığın, fidye yazılımı grubu Storm-1175 tarafından aktif olarak istismar edildiğini duyurdu. https://t.co/RYrTvcmCL

    @KamCyberTR

    8 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 🚨 Storm-1175 just weaponized a zero-day in GoAnywhere MFT (CVE-2025-10035) to drop Medusa ransomware. The exploit is beautifully nasty—bypasses auth entirely through the License Servlet. One request, full server takeover. They're using it to plant RMM tools (MeshAgent, http

    @the_c_protocol

    8 Oct 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. ⚠️ Microsoft Links Storm-1175 to GoAnywhere Exploit A critical GoAnywhere flaw (CVE-2025-10035) is being exploited to deploy Medusa ransomware. 🔗 https://t.co/CaZUxL0ghD #CyberSecurity #Ransomware #Microsoft #ThreatAlert #TechPIO https://t.co/IufENrECoU

    @techpio_team

    8 Oct 2025

    58 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. Microsoft: Critical GoAnywhere bug exploited in ransomware attacks! A maximum-severity bug (CVE-2025-10035) in GoAnywhere MFT is being actively exploited by the threat group Storm-1175 in Medusa ransomware campaigns. The flaw allows remote code execution via untrusted https://t

    @ChbibAnas

    8 Oct 2025

    33 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  38. 🔍 𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐕𝐄 𝐛𝐫𝐞𝐚𝐤𝐝𝐨𝐰𝐧 𝐚𝐯𝐚𝐢𝐥𝐚𝐛𝐥𝐞 𝐧𝐨𝐰! Medusa ransomware is exploiting CVE-2025-10035 in GoAnywhere. Learn how real-time ransomware intelligence boosts defense against this high-severity t

    @PurpleOps_io

    8 Oct 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. 🚨 Microsoft just confirmed a critical GoAnywhere flaw (CVE-2025-10035) — already exploited to deploy Medusa ransomware. Attackers had a month-long head start — silently breaching orgs while vendors stayed quiet It’s not just RCE it’s persistence, lateral movement, and

    @neurasoftdev

    8 Oct 2025

    48 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  40. #threatreport #MediumCompleteness Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability | 06-10-2025 Source: https://t.co/JoAQvJhxWM Key details below ↓ 🧑‍💻Actors/Campaigns: Storm-1175 (🧠motivation: cyber_criminal) 💀T

    @rst_cloud

    7 Oct 2025

    67 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. Crypto fraud spikes with AI deepfakes, ransomware zero-days, and massive data leaks dominating the last hour’s critical cyber updates: 🛡️ Storm-1175 ransomware exploits zero-day CVE-2025-10035 in Fortra’s GoAnywhere MFT for remote code execution, lateral moves, data the

    @np_cyber_news

    7 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. GoAnywhere RCE via Forged License Exploit (CVE-2025-10035) On September 18, 2025, a critical vulnerability (CVE-2025-10035) in the GoAnywhere Managed File Transfer (MFT) product was disclosed. The flaw lies in the license servlet’s deserialization logic: an attacker who crafts

    @SPSDigitalTech

    7 Oct 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 🚨 CVE-2025-10035: The GoAnywhere Zero-Day Nightmare Storm-1175 exploited this CVSS 10.0 flaw BEFORE it was even disclosed. Medusa ransomware + license servlet deserialization = perfect storm. The scariest part? They somehow got Fortra's private signing key 🔐 20,000+ http

    @ctrlaltnod

    7 Oct 2025

    46 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. Investigating Active Exploitation Of CVE-2025-10035 GoAnywhere Managed File Transfer Vulnerability https://t.co/FqCDAlznSx #news

    @packet_storm

    7 Oct 2025

    182 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. Originally from: MS Threat Intel: Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability https://t.co/Q0fxaxanGm ( :-{ı▓ #CTI #cybersecurity #cyberresearch https://t.co/dnfM1wg2ft

    @Cyb3rR3s34rch

    7 Oct 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. ⚠️ @Microsoft confirms Storm-1175 is exploiting a critical GoAnywhere MFT bug (CVE-2025-10035) in Medusa ransomware attacks. - Remote deserialization flaw - Lateral movement using RMM tools - File exfiltration via Rclone - Deployed ransomware payloads 💬 Has your GoAnywhere

    @TechNadu

    7 Oct 2025

    63 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability https://t.co/e5CaLhd4Q0 A critical deserialization vulnerability, identified as CVE-2025-10035 with a CVSS score of 10.0, has been discovered in GoAnywhere MFT’s License Servlet.

    @f1tym1

    7 Oct 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🚨 Alerta de segurança! Uma falha crítica no GoAnywhere MFT está sendo explorada por cibercriminosos para espalhar o ransomware Medusa. 🔍 Identificada como CVE-2025-10035, a vulnerabilidade permite execução remota de código (RCE) sem autenticação dando aos invasores

    @TechStartXYZ

    7 Oct 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. ⌨️ Microsoft fixes the wave of attacks Medusa Due to the critical deperialization vulnerability in Fortra GoanyWhere (Cve-2025-10035, CVSS 10.0): Group Storm-1175 uses open web interfaces, puts RMM (SIMPLEHELP, MESHAGENT), moves over the network through mstsc.exe, exfoliate d

    @Hack_Your_Mom

    7 Oct 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Microsoft indaga lo sfruttamento attivo della falla critica CVE-2025-10035 in GoAnywhere MFT Vulnerabilità, GoAnywhere, medusa, Microsoft Defender, Ransomware, Storm-1175 https://t.co/ac1ZdOD5MJ https://t.co/gIz1vq40WG

    @matricedigitale

    7 Oct 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations