{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T12:03:12.697","vulnerabilities":[{"cve":{"id":"CVE-2025-13444","sourceIdentifier":"security@progress.com","published":"2026-01-13T15:15:57.913","lastModified":"2026-02-13T21:46:29.560","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters"},{"lang":"es","value":"Vulnerabilidad de ejecución remota de código por inyección de comandos del sistema operativo en la API de Progress LoadMaster permite a un atacante autenticado con permisos de 'Administración de Usuarios' ejecutar comandos arbitrarios en el dispositivo LoadMaster explotando la entrada no saneada en los parámetros de entrada de la API."}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:connection_manager_for_objectscale:*:*:*:*:*:*:*:*","versionEndExcluding":"7.2.62.2","matchCriteriaId":"F7052639-332E-4077-BE5A-60B87A964E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ecs_connection_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"7.2.62.2","matchCriteriaId":"1FC15908-9A59-4CB5-8279-02F3E061AB11"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:*","versionEndExcluding":"7.2.54.16","matchCriteriaId":"CB2D26CD-AF3F-463E-913F-FC41B0F122C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:*","versionEndExcluding":"7.2.62.2","matchCriteriaId":"146A0610-9E1C-4614-9327-92D0336A82BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:moveit_waf:7.2.62.1:*:*:*:*:*:*:*","matchCriteriaId":"7935C9E7-E371-463E-B9EF-F2F52DCE4315"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:multi-tenant_hypervisor:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.35.15","matchCriteriaId":"621720F8-C897-4CB6-BED8-687BB400D5DC"}]}]}],"references":[{"url":"https://community.progress.com/s/article/Connection-Manager-for-ObjectScale-Vulnerabilities-CVE-2025-13444-CVE-2025-13447","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://community.progress.com/s/article/ECS-Connection-Manager-Vulnerabilities-CVE-2025-13444-CVE-2025-13447","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://community.progress.com/s/article/LoadMaster-Vulnerabilities-CVE-2025-13444-CVE-2025-13447","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://community.progress.com/s/article/MOVEit-WAF-Vulnerabilities-CVE-2025-13444-CVE-2025-13447","source":"security@progress.com","tags":["Vendor Advisory"]}]}}]}