Fortra’s GoAnywhere Gaffe: Patch Delays and Zero-Day Exploitation Drama!
The Fortra GoAnywhere MFT vulnerability, CVE-2025-10035, was exploited a week before patches were issued, according to watchTowr. This deserialization flaw had hackers creating backdoor admin accounts faster than you can say “patch me up, Scotty!” Fortra’s delayed response left organizations exposed to potential attacks.

Hot Take:
It seems Fortra’s GoAnywhere MFT vulnerability was the hottest ticket in cyber town, with hackers jumping the gun and exploiting it before the security patches could even catch their breath. You have to admire their dedication to punctuality, even if it’s for all the wrong reasons. This is a classic case of “too little, too late,” much like realizing you’ve been sending your juicy gossip to the wrong group chat for a week. Oops! Time to go back to the drawing board, Fortra!
Key Points:
– Fortra released patches for a high-severity vulnerability long after hackers had already joined the party.
– The flaw, CVE-2025-10035, involves deserialization vulnerabilities that could allow command injection.
– Hackers exploited the bug for remote code execution and sneaky backdoor admin account creation.
– Over 20,000 GoAnywhere MFT instances are potentially vulnerable, including some big fish like Fortune 500 companies.
– The exploitation hinges on a private key that remains as elusive as a unicorn in a haystack.