CVE-2025-7388
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-04

Last updated on: 2025-09-04

Assigner: Progress Software Corporation

Description
It was possible to perform Remote Command Execution (RCE) via Java RMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and execute OS commands under the delegated authority of the AdminServer process.Β  An RMI interface permitted manipulation of a configuration property with inadequate input validation leading to OS command injection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-04
Last Modified
2025-09-04
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
progress openedge 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows authenticated users to perform Remote Command Execution (RCE) through the Java RMI interface in the OpenEdge AdminServer. Specifically, the RMI interface permits manipulation of a configuration property without adequate input validation, which leads to OS command injection. This means attackers can inject and execute operating system commands with the privileges of the AdminServer process.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized execution of OS commands on the affected system, potentially allowing attackers to take control of the system, access sensitive data, disrupt services, or escalate privileges. Since the commands run with the AdminServer process authority, the impact can be severe, including data compromise, service interruption, and further network penetration.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart