CVE-2026-0971
Received Received - Intake
Improper Session Timeout in GoAnywhere MFT Affects SAML Login

Publication date: 2026-04-21

Last updated on: 2026-04-23

Assigner: Fortra

Description
An improper session timeout issue in Fortra's GoAnywhere MFT prior to version 7.10.0 results in SAML configured Web Users being redirected to the regular login page instead of the SAML login page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fortra goanywhere_managed_file_transfer to 7.10.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper session timeout issue in Fortra's GoAnywhere MFT software versions prior to 7.10.0. Specifically, when Web Users are configured to use SAML for authentication, they are incorrectly redirected to the regular login page instead of the SAML login page after their session times out.


How can this vulnerability impact me? :

The impact of this vulnerability is that users who are supposed to authenticate via SAML may be redirected to the standard login page after a session timeout. This could cause confusion or disrupt the intended single sign-on experience. The CVSS score of 4.3 indicates a low to medium severity with limited confidentiality impact and no integrity or availability impact.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart