CVE-2025-7388
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-09-04
Assigner: Progress Software Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| progress | openedge | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows authenticated users to perform Remote Command Execution (RCE) through the Java RMI interface in the OpenEdge AdminServer. Specifically, the RMI interface permits manipulation of a configuration property without adequate input validation, which leads to OS command injection. This means attackers can inject and execute operating system commands with the privileges of the AdminServer process.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized execution of OS commands on the affected system, potentially allowing attackers to take control of the system, access sensitive data, disrupt services, or escalate privileges. Since the commands run with the AdminServer process authority, the impact can be severe, including data compromise, service interruption, and further network penetration.