CVE-2026-0971
Improper Session Timeout in GoAnywhere MFT Affects SAML Login
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Fortra
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortra | goanywhere_managed_file_transfer | to 7.10.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper session timeout issue in Fortra's GoAnywhere MFT software versions prior to 7.10.0. Specifically, when Web Users are configured to use SAML for authentication, they are incorrectly redirected to the regular login page instead of the SAML login page after their session times out.
How can this vulnerability impact me? :
The impact of this vulnerability is that users who are supposed to authenticate via SAML may be redirected to the standard login page after a session timeout. This could cause confusion or disrupt the intended single sign-on experience. The CVSS score of 4.3 indicates a low to medium severity with limited confidentiality impact and no integrity or availability impact.