CrowdSec
4/10CrowdSec Score

GoAnywhere MFT - Authentication Bypass (CVE-2024-0204)

Published on22-01-2024
First seen on26-09-2025

587Exploiting IPs reported

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

CrowdSec analysis

CVE-2024-0204 is a critical authentication bypass vulnerability in Fortra's GoAnywhere MFT prior to version 7.4.1, allowing unauthorized users to create admin accounts through the administration portal. This flaw could enable attackers to gain full administrative control over the system, leading to potential data breaches, system manipulation, and further exploitation of sensitive information.

CrowdSec has been tracking this vulnerability and its exploits since 25th of September 2025.

According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2024-0204 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. In addition, according to the CrowdSec network, attack volume against CVE-2024-0204 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit authentication bypass by sending requests to URLs containing /goanywhere/images/..;/wizard/InitialAccountSetup.xhtml, allowing unauthorized creation of administrator accounts on Fortra GoAnywhere MFT systems.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.