Security concerns have intensified within the cybersecurity community after Forta disclosed a maximum-severity vulnerability, CVE-2025-10035, in its GoAnywhere MFT file-transfer software. Many organizations depend on GoAnywhere MFT to securely exchange sensitive data, raising apprehensions about potential real-world impacts. Different narratives have emerged: while Forta has not confirmed active exploitation, security researchers are witnessing credible activity exploiting the flaw. The debate spotlights the wider issue of transparency and timely communication from software vendors, which is crucial for fast, effective defensive measures.
Previously, reports about vulnerabilities in GoAnywhere MFT have prompted swift investigations, but seldom did they create such uncertainty about real-world exploitation. Earlier incidents from 2023 revealed how threat actors used zero-day vulnerabilities in the same product to target private and public sector organizations globally. In contrast to the past, the lack of clear statements from Forta this time leaves security teams more reliant on independent research for guidance, contributing to mounting anxiety throughout the sector. This pattern signals that trust between vendors and security professionals may be further strained by inconsistent communication practices.
How Are Threat Researchers Responding?
Security teams at research firms, including watchTowr and VulnCheck, have reported strong evidence of exploitation tied to the GoAnywhere MFT vulnerability, indicating a possible window of undetected attacks stretching back to early September. Researchers urge organizations using GoAnywhere MFT to monitor for Indicators of Compromise (IOCs) and inspect logs for newly-shared markers from Forta. However, the company’s limited public statements have frustrated some analysts. Ben Harris, CEO of watchTowr, expressed concerns over the situation:
“All they had to do was just be honest and transparent — and instead, have turned this into scandal.”
What Technical Barriers Remain for Attackers?
Researchers explain that successful exploitation of CVE-2025-10035 relies on an attacker possessing a specific private key, which is not included in GoAnywhere’s code base. The suspected existence of this key outside its expected environment, potentially obtained from a cloud-based license server, adds to speculation and worry. While no public exploit has surfaced due to this missing key, the risk remains significant given previous attacks leveraging similar circumstances, as seen with Microsoft Exchange Online and other organizations in the past year.
Why Are Calls for Vendor Transparency Growing Louder?
As security experts point out, transparent and timely updates from software vendors can dramatically help defenders respond to critical vulnerabilities. The presence of IOCs in Forta’s advisory is unusual without confirmation of active attacks, raising additional questions about the company’s internal assessment. Caitlin Condon, vice president of security research at VulnCheck, highlighted the importance of direct vendor communication:
“The easiest way to know whether this vulnerability, or any vulnerability, has been exploited would be for the vendor to explicitly disclose whether they’re aware of confirmed malicious activity in customer environments.”
The issue recalls Forta’s similar experience in 2023, where delayed and vague communications complicated response efforts across its user base.
Instances like the current GoAnywhere MFT vulnerability underscore ongoing challenges around vendor responsibility, supply chain risks, and the crucial nature of private key security. Operators of critical software rely heavily on vendors for swift, clear information sharing—not only in advisories but also by promptly acknowledging real-world exploitation events. Security professionals should monitor for updates, cross-reference findings from multiple reputable sources, and review internal detection protocols for signs of compromise. Reviewing public commentary as well as company statements can give a more comprehensive picture, as both technical and organizational transparency directly impact defense capabilities.