CVE-2025-13444

HIGH

Progress LoadMaster < 7.2.62.2 - Authenticated OS Command Injection via API Input Parameters

Title source: llm
STIX 2.1

Description

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters

Scores

CVSS v3 8.4
EPSS 0.0005
EPSS Percentile 15.6%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (6)
progress/connection_manager_for_objectscale < 7.2.62.2
progress/ecs_connection_manager < 7.2.62.2
progress/loadmaster < 7.2.54.16
progress/loadmaster < 7.2.62.2
progress/moveit_waf 7.2.62.1
progress/multi-tenant_hypervisor < 7.1.35.15
Published Jan 13, 2026
Tracked Since Feb 18, 2026