Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress ecs Connection Manager Progress loadmaster Progress moveit Waf Progress object Scale Connection Manager |
|
| Vendors & Products |
Progress
Progress ecs Connection Manager Progress loadmaster Progress moveit Waf Progress object Scale Connection Manager |
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process. | |
| Title | OS Command Injection Remote Code Execution Vulnerability in Progress LoadMaster, ECS Connection Manager, Object Scale Connection Manager & MOVEit WAF | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-04-22T03:55:54.495Z
Reserved: 2026-03-12T12:17:05.403Z
Link: CVE-2026-4048
Updated: 2026-04-20T13:59:45.415Z
Status : Awaiting Analysis
Published: 2026-04-20T14:16:20.700
Modified: 2026-04-20T19:05:30.750
Link: CVE-2026-4048
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:48:02Z