CVE-2025-13447

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:progress:connection_manager_for_objectscale*:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:ecs_connection_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:*
cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:*
cpe:2.3:a:progress:moveit_waf:7.2.62.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:multi-tenant_hypervisor:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-13 15:15

Updated : 2026-02-10 18:18


NVD link : CVE-2025-13447

Mitre link : CVE-2025-13447

CVE.ORG link : CVE-2025-13447


JSON object : View

Products Affected

progress

  • loadmaster
  • ecs_connection_manager
  • moveit_waf
  • connection_manager_for_objectscale*
  • multi-tenant_hypervisor
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')