CVE-2025-10035
Analyzed
Published: 18 Sept 2025, 22:15
Last modified:24 Oct 2025, 13:44
Vulnerability Summary
Overall Risk
Critical Risk
79/100 AI Analysis
Emergency
Requires Immediate Action AI Detection
Active in Wild
Exploitation Detected CVSS Score
10 CRITICAL
CVSS v3.1 (DF4DEE71-DE3A-4139-9588-11B62FE6C0FF)
EPSS Score
60.12% HIGH
60% probability +0.94%
CISA KEV
Listed
Fortra
Ransomware
Known Use
Exploits
None found
Dark Web
Activity detected
Telegram
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Source Identifier: df4dee71-de3a-4139-9588-11b62fe6c0ff
| CVSS | Source | Severity | Exploit. | Impact | Vector |
|---|---|---|---|---|---|
| v4.0 | n/a | ||||
| v3.1 | df4dee71-de3a-4139-9588-11b62fe6c0ff | 10 CRITICAL | 3.9 | 6 | CVSS:3.1/AV:N/AC:L/PR:N/U... |
| v3.1 | Primarynvd@nist.gov | 9.8 CRITICAL | 3.9 | 5.9 | CVSS:3.1/AV:N/AC:L/PR:N/U... |
| v3.0 | n/a | ||||
| v2.0 | n/a | ||||
45.81%
Current Score
+0.94%
97%ile
Percentile Rank
+0.05%
Loading chart...
Loading chart...
Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-77
Description:The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Deserialization of Untrusted Data CWE-502
Description:The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Vulnerability Name:Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability
Added to CISA Catalog:29 Sept 2025, 00:00
Action Due:20 Oct 2025, 00:00
Known Ransomware: Ransomware
Required Action:Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.
No known public exploit code indexed (as of 24 Oct 2025, 13:44).
Exploitation status can change quickly once PoC code appears.
Affected Configurations (CPE)
fortra goanywhere_managed_file_transferVulnerable
Version: *
cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*
fortra goanywhere_managed_file_transferVulnerable
Version: *
cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*
| URL | Tags | Source |
|---|---|---|
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-10035 | - | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-10035 | us government resource | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
| https://www.fortra.com/security/advisories/product-security/fi-2025-012 | vendor advisory | df4dee71-de3a-4139-9588-11b62fe6c0ff |