CVE-2026-3692
Published: 02 April 2026
Description
In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by identifying, reporting, and correcting the command injection flaw through timely patching or upgrading to Flowmon 12.5.8 or later.
Enforces input validation at the report generation interface to block crafted malicious requests that inject and execute unintended commands.
Limits the impact of command injection by ensuring low-privileged users and processes have only necessary privileges to execute server commands.
Security SummaryAI
CVE-2026-3692 is a command injection vulnerability (CWE-78) affecting Progress Flowmon versions prior to 12.5.8. It occurs during the report generation process, where an authenticated low-privileged user can craft a malicious request that causes unintended commands to be executed on the server. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete server compromise.
An attacker with low-privileged authenticated access to the Flowmon system can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting a specially designed request during report generation, the attacker can execute arbitrary commands on the underlying server, potentially leading to high-impact confidentiality, integrity, and availability violations, such as data exfiltration, modification, or denial of service.
The Progress advisory at https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon recommends upgrading to Flowmon version 12.5.8 or later to mitigate the vulnerability.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in report generation enables exploitation of public-facing application (T1190) for remote code execution via command interpreter (T1059) and privilege escalation from low-priv to server compromise (T1068).