GoAnywhere MFT’s License Servlet Vulnerability: Patch Now or Face the Wrath of Rogue Bytes!

Fortra has issued security updates to fix a severe vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035. This flaw, caused by deserialization of untrusted data, can lead to command injection attacks. Admins should patch quickly as GoAnywhere MFT remains a juicy target for threat actors.

Pro Dashboard

Hot Take:

Fortra’s GoAnywhere MFT just went from “Secure Transfer” to “Command Injection Central”! Who knew that your file transfer tool could be a welcome mat for cyber baddies? Time to patch it up and put those hackers on a digital diet!

Key Points:

  • Fortra patched a severe vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035.
  • The vulnerability arises from the deserialization of untrusted data, allowing potential command injection attacks.
  • Fortra advises immediate software updates or securing the Admin Console to prevent internet exposure.
  • Over 470 instances of GoAnywhere MFT are being monitored, but the patch status remains unclear.
  • Past breaches, like the Clop ransomware attack, highlight the attractiveness of targeting secure file transfer solutions.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?