In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
References
| Link | Resource |
|---|---|
| https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon | Vendor Advisory |
Configurations
History
07 Apr 2026, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon - Vendor Advisory | |
| CPE | cpe:2.3:a:progress:flowmon:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Progress
Progress flowmon |
02 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 14:16
Updated : 2026-04-07 18:45
NVD link : CVE-2026-3692
Mitre link : CVE-2026-3692
CVE.ORG link : CVE-2026-3692
JSON object : View
Products Affected
progress
- flowmon
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
