Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers | 
|---|---|
| https://community.progress.com/s/article/CVE-2025-10239 |     | 
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Progress Progress flowmon | |
| Vendors & Products | Progress Progress flowmon | 
Thu, 09 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In Flowmon versions prior to 12.5.5, a vulnerability has been identified that allows a user with administrator privileges and access to the management interface to execute additional unintended commands within scripts intended for troubleshooting purposes. | |
| Title | Unintended command execution via troubleshooting scripts in Progress Flowmon | |
| Weaknesses | CWE-78 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2025-10-10T03:55:22.638Z
Reserved: 2025-09-10T16:28:09.808Z
Link: CVE-2025-10239
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-09T13:30:06.100Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-09T13:15:31.753
Modified: 2025-10-09T15:50:04.013
Link: CVE-2025-10239
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-10-10T11:17:58Z