GoAnywhere MFT’s License Servlet Vulnerability: Patch Now or Face the Wrath of Rogue Bytes!
Fortra has issued security updates to fix a severe vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035. This flaw, caused by deserialization of untrusted data, can lead to command injection attacks. Admins should patch quickly as GoAnywhere MFT remains a juicy target for threat actors.

Hot Take:
Fortra’s GoAnywhere MFT just went from “Secure Transfer” to “Command Injection Central”! Who knew that your file transfer tool could be a welcome mat for cyber baddies? Time to patch it up and put those hackers on a digital diet!
Key Points:
- Fortra patched a severe vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035.
- The vulnerability arises from the deserialization of untrusted data, allowing potential command injection attacks.
- Fortra advises immediate software updates or securing the Admin Console to prevent internet exposure.
- Over 470 instances of GoAnywhere MFT are being monitored, but the patch status remains unclear.
- Past breaches, like the Clop ransomware attack, highlight the attractiveness of targeting secure file transfer solutions.
Already a member? Log in here