Description
A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session.
Published: 2026-03-12
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized In-Session Actions via XSS
Action: Patch
AI Analysis

Impact

The vulnerability is a cross‑site scripting flaw (CWE‑79) that allows an administrator who clicks a malicious link to trigger unintended actions within their authenticated web session. Because the attacker can instruct the web application to perform these actions while the user remains logged in, the flaw can lead to unauthorized modifications to configuration or data, potentially compromising confidentiality and integrity. The description explicitly states that the event occurs only when an admin clicks a link, indicating that the impact is executed through the user's browser and the administrator’s privileges.

Affected Systems

Progress Software Flowmon ADS versions earlier than 12.5.5 and 13.0.3 are affected. The flaw applies to all installations of these product releases where administrators have access to the web interface.

Risk and Exploitability

The CVSS score of 8.6 labels the vulnerability as High severity, and its EPSS score of less than 1% suggests a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, indicating no known large‑scale exploitation at this time. Exploitation requires an administrator to be authenticated in the web application and to click a crafted link, implying that the attack vector is user‑interaction based and the attacker must deliver or entice the user with the malicious URL. Given the high severity but low EPSS, the overall risk is moderate pending user awareness and readiness to apply the available patch.

Generated by OpenCVE AI on March 18, 2026 at 14:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowmon ADS to version 12.5.5 or later, or 13.0.3 or later to eliminate the XSS flaw.
  • Restrict administrator web access to a secure, trusted environment and disable or filter unsolicited external links.
  • Use browser‑level XSS protection measures such as Content Security Policy (CSP) or XSS auditor settings.
  • Monitor system logs for anomalous configuration changes or suspicious administrative activity.
  • Contact Progress support for guidance if a patch is unavailable or if further hardening is required.

Generated by OpenCVE AI on March 18, 2026 at 14:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Progress Software
Progress Software flowmon Ads
Vendors & Products Progress Software
Progress Software flowmon Ads

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session.
Title Possibility of unintended actions when an administrator clicks a malicious link in the Progress Flowmon ADS web application
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N'}


Subscriptions

Progress Software Flowmon Ads
cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2026-03-13T03:55:42.297Z

Reserved: 2026-02-14T09:56:23.317Z

Link: CVE-2026-2513

cve-icon Vulnrichment

Updated: 2026-03-12T14:11:50.761Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T13:16:14.023

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-2513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:49Z

Weaknesses