CVE-2025-13444
HIGHProgress LoadMaster < 7.2.62.2 - Authenticated OS Command Injection via API Input Parameters
Title source: llmDescription
OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters
References (4)
Core 4
Core References
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/LoadMaster-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/ECS-Connection-Manager-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/Connection-Manager-for-ObjectScale-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/MOVEit-WAF-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Scores
CVSS v3
8.4
EPSS
0.0005
EPSS Percentile
15.6%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (6)
progress/connection_manager_for_objectscale
< 7.2.62.2
progress/ecs_connection_manager
< 7.2.62.2
progress/loadmaster
< 7.2.54.16
progress/loadmaster
< 7.2.62.2
progress/moveit_waf
7.2.62.1
progress/multi-tenant_hypervisor
< 7.1.35.15
Published
Jan 13, 2026
Tracked Since
Feb 18, 2026