CVE-2025-10035

Analyzed
Published: 18 Sept 2025, 22:15
Last modified:24 Oct 2025, 13:44

Vulnerability Summary

Overall Risk
Critical Risk
79/100
AI Analysis
Emergency
Requires Immediate Action
AI Detection
Active in Wild
Exploitation Detected
CVSS Score
10 CRITICAL
CVSS v3.1 (DF4DEE71-DE3A-4139-9588-11B62FE6C0FF)
EPSS Score
60.12% HIGH
60% probability +0.94%
CISA KEV
Listed
Fortra
Ransomware
Known Use
Exploits
None found
Dark Web
Activity detected
Telegram
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Source Identifier: df4dee71-de3a-4139-9588-11b62fe6c0ff
CVSSSourceSeverityExploit.ImpactVector
v4.0n/a
v3.1df4dee71-de3a-4139-9588-11b62fe6c0ff10 CRITICAL3.96
CVSS:3.1/AV:N/AC:L/PR:N/U...
v3.1Primarynvd@nist.gov9.8 CRITICAL3.95.9
CVSS:3.1/AV:N/AC:L/PR:N/U...
v3.0n/a
v2.0n/a
45.81%
Current Score
+0.94%
97%ile
Percentile Rank
+0.05%
Loading chart...
Loading chart...
Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-77
Description:The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Deserialization of Untrusted Data CWE-502
Description:The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Vulnerability Name:Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability
Added to CISA Catalog:29 Sept 2025, 00:00
Action Due:20 Oct 2025, 00:00
Known Ransomware: Ransomware
Required Action:Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.

No known public exploit code indexed (as of 24 Oct 2025, 13:44).

Exploitation status can change quickly once PoC code appears.

Affected Configurations (CPE)

fortra goanywhere_managed_file_transferVulnerable
Version: *
cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*
fortra goanywhere_managed_file_transferVulnerable
Version: *
cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*
© 2025 CveMate. All rights reserved.v0.1.4