Cyber Posture

CVE-2026-3692

High

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by identifying, reporting, and correcting the command injection flaw through timely patching or upgrading to Flowmon 12.5.8 or later.

prevent

Enforces input validation at the report generation interface to block crafted malicious requests that inject and execute unintended commands.

prevent

Limits the impact of command injection by ensuring low-privileged users and processes have only necessary privileges to execute server commands.

Security SummaryAI

CVE-2026-3692 is a command injection vulnerability (CWE-78) affecting Progress Flowmon versions prior to 12.5.8. It occurs during the report generation process, where an authenticated low-privileged user can craft a malicious request that causes unintended commands to be executed on the server. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete server compromise.

An attacker with low-privileged authenticated access to the Flowmon system can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting a specially designed request during report generation, the attacker can execute arbitrary commands on the underlying server, potentially leading to high-impact confidentiality, integrity, and availability violations, such as data exfiltration, modification, or denial of service.

The Progress advisory at https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon recommends upgrading to Flowmon version 12.5.8 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

progress
flowmon
≤ 12.5.8

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Command injection in report generation enables exploitation of public-facing application (T1190) for remote code execution via command interpreter (T1059) and privilege escalation from low-priv to server compromise (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References