
Critical Fortra GoAnywhere Vulnerability (CVE-2025-10035): A Guide to Protecting Your Systems
A critical security vulnerability has been identified in Fortra’s GoAnywhere MFT (Managed File Transfer) software, posing a significant risk to organizations that rely on the platform. Tracked as CVE-2025-10035, this flaw allows unauthenticated attackers to gain complete administrative control over affected systems, potentially leading to a full system takeover.
Given the widespread use of GoAnywhere MFT for securing and automating file transfers, this vulnerability requires immediate attention from IT administrators and security teams. Understanding the threat and taking swift, decisive action is essential to prevent exploitation.
Understanding CVE-2025-10035: An Authentication Bypass Flaw
At its core, CVE-2025-10035 is an authentication bypass vulnerability. This means an attacker does not need valid login credentials to exploit it. By sending a specially crafted request to a vulnerable GoAnywhere MFT instance, a remote attacker can create a new administrative user account.
Once this malicious admin account is created, the attacker effectively holds the keys to the kingdom. They gain the same level of access as a legitimate administrator, enabling them to:
- View, modify, or delete any file on the system.
- Change security configurations and system settings.
- Create or delete other user accounts.
- Execute commands and deploy additional malicious software.
The ease of exploitation combined with the high level of access it grants makes this a particularly dangerous vulnerability. No user interaction is required, and the attack can be launched remotely against any internet-facing, unpatched GoAnywhere MFT server.
The High-Stakes Risk of a System Takeover
The potential impact of a successful exploit cannot be overstated. With full administrative control, an attacker can inflict severe damage on an organization. The primary risks include:
- Sensitive Data Exfiltration: Attackers can steal confidential corporate data, customer information, intellectual property, and other sensitive files managed by the MFT solution.
- Ransomware Deployment: The compromised server can be used as a beachhead to deploy ransomware across the corporate network, encrypting critical files and demanding a ransom.
- Business Disruption: Malicious actors can disrupt critical business operations by deleting essential files, altering configurations, or shutting down the file transfer service entirely.
- Lateral Movement: The compromised GoAnywhere server can be used as a pivot point to launch further attacks against other systems within the internal network.
Immediate Action Required: How to Secure Your GoAnywhere MFT Instance
Fortra has released a security patch to address this critical vulnerability. All organizations using GoAnywhere MFT must take immediate steps to mitigate the risk.
1. Patch Immediately
The most critical step is to apply the security update provided by Fortra. The vulnerability is fixed in GoAnywhere MFT version 7.4.1 and later. Administrators should prioritize upgrading their instances to the latest secure version without delay. Delaying this update leaves your systems exposed to active exploitation attempts.
2. Implement Temporary Mitigations (If Patching Is Not Possible)
If you are unable to apply the patch immediately, Fortra has provided temporary mitigation guidance. This workaround involves modifying a configuration file to disable the vulnerable functionality. However, this should only be considered a temporary stopgap measure. Applying the official patch is the only permanent solution.
3. Hunt for Signs of Compromise
Because this vulnerability allows for the creation of new administrator accounts, it is crucial to audit your system for any signs of unauthorized activity. We strongly recommend the following actions:
- Review all administrative accounts: Carefully examine the list of users with administrative privileges in your GoAnywhere MFT console. Look for any accounts that were recently created or that you do not recognize.
- Analyze audit logs: Scrutinize system logs for unusual login events, unexpected configuration changes, or large, unexplained file transfers, especially those occurring at odd hours.
- Check for suspicious network connections: Monitor outbound network traffic from your GoAnywhere server for connections to unfamiliar IP addresses or domains.
Taking proactive steps to secure your managed file transfer solution is not just a technical requirement—it is a fundamental component of maintaining business integrity and protecting sensitive data. The discovery of CVE-2025-10035 serves as a critical reminder that vigilance and swift patch management are essential in today’s evolving threat landscape.
Source: https://www.helpnetsecurity.com/2025/09/22/fortra-goanywhere-vulnerability-cve-2025-10035/


