CVE-2025-13447
HIGHProgress LoadMaster < 7.2.54.16 and < 7.2.62.2 - Authenticated Remote Code Execution via API Input Parameter
Title source: llmDescription
OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters
References (4)
Core 4
Core References
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/LoadMaster-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/ECS-Connection-Manager-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/Connection-Manager-for-ObjectScale-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Vendor Advisory vendor-advisory
https://community.progress.com/s/article/MOVEit-WAF-Vulnerabilities-CVE-2025-13444-CVE-2025-13447
Scores
CVSS v3
8.4
EPSS
0.0016
EPSS Percentile
35.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (6)
progress/connection_manager_for_objectscale*
< 7.2.62.2
progress/ecs_connection_manager
< 7.2.62.2
progress/loadmaster
< 7.2.54.16
progress/loadmaster
< 7.2.62.2
progress/moveit_waf
7.2.62.1
progress/multi-tenant_hypervisor
< 7.1.35.15
Published
Jan 13, 2026
Tracked Since
Feb 18, 2026