Hackers Gone Wild: Fortra’s GoAnywhere MFT Vulnerability Exploited with Zero Day Flair!
Hackers are having a field day exploiting Fortra GoAnywhere CVE-2025-10035, a deserialization vulnerability allowing remote command injection. While Fortra kept a tight lip, WatchTowr Labs uncovered evidence of in-the-wild attacks. Admins, patch up and check logs for errors containing ‘SignedObject.getObject’—before hackers start a conga line on your servers!

Hot Take:
Breaking news: Fortra’s GoAnywhere software vulnerability – hackers’ new favorite playground! This could definitely be worse than having your Wi-Fi hacked by your neighbor in the middle of a Netflix binge. Time to patch up, folks, before your company’s files go on an unauthorized world tour!
Key Points:
- Fortra’s GoAnywhere MFT has a critical vulnerability, CVE-2025-10035, that allows remote command injection without authentication.
- The flaw is a deserialization vulnerability in the License Servlet, enabling command injection by a forged license response signature.
- Security firm WatchTowr Labs reported the vulnerability being exploited as a zero-day since September 10, 2025, eight days before Fortra’s advisory.
- Attackers are creating backdoor accounts and executing commands to explore compromised environments.
- Administrators are advised to upgrade to patched versions and remove public internet exposure for the GoAnywhere Admin Console.
Already a member? Log in here