CVE-2025-13447

HIGH

Progress LoadMaster < 7.2.54.16 and < 7.2.62.2 - Authenticated Remote Code Execution via API Input Parameter

Title source: llm
STIX 2.1

Description

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters

Scores

CVSS v3 8.4
EPSS 0.0016
EPSS Percentile 35.9%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (6)
progress/connection_manager_for_objectscale* < 7.2.62.2
progress/ecs_connection_manager < 7.2.62.2
progress/loadmaster < 7.2.54.16
progress/loadmaster < 7.2.62.2
progress/moveit_waf 7.2.62.1
progress/multi-tenant_hypervisor < 7.1.35.15
Published Jan 13, 2026
Tracked Since Feb 18, 2026