CVE-2026-3692

In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:flowmon:*:*:*:*:*:*:*:*

History

07 Apr 2026, 18:45

Type Values Removed Values Added
References () https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon - () https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon - Vendor Advisory
CPE cpe:2.3:a:progress:flowmon:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Progress
Progress flowmon

02 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 14:16

Updated : 2026-04-07 18:45


NVD link : CVE-2026-3692

Mitre link : CVE-2026-3692

CVE.ORG link : CVE-2026-3692


JSON object : View

Products Affected

progress

  • flowmon
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')