In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exists whereby an adversary with access to Flowmon monitoring ports may craft malicious network data that, when processed by Flowmon ADS and viewed by an authenticated user, could result in unintended actions being executed in the user's browser context.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exists whereby an adversary with access to Flowmon monitoring ports may craft malicious network data that, when processed by Flowmon ADS and viewed by an authenticated user, could result in unintended actions being executed in the user's browser context.
Title Possibility of unintended actions when viewing maliciously crafted network data in Progress Flowmon ADS web application
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2026-03-12T14:08:01.579Z

Reserved: 2026-02-14T09:56:25.024Z

Link: CVE-2026-2514

cve-icon Vulnrichment

Updated: 2026-03-12T14:07:52.897Z

cve-icon NVD

Status : Received

Published: 2026-03-12T13:16:14.203

Modified: 2026-03-12T13:16:14.203

Link: CVE-2026-2514

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses