OS Command Injection Remote Code Execution Vulnerability in Progress LoadMaster, ECS Connection Manager, Object Scale Connection Manager & MOVEit WAF
Summary
| CVE | CVE-2026-3517 |
|---|---|
| State | PUBLISHED |
| Assigner | ProgressSoftware |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-20 14:16:19 UTC |
| Updated | 2026-05-01 18:20:13 UTC |
| Description | OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command |
Risk And Classification
Primary CVSS: v3.1 7.2 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000430000 probability, percentile 0.130140000 (date 2026-05-05)
Problem Types: CWE-77 | CWE-77 CWE-77
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | [email protected] | Secondary | 8.4 | HIGH | CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 8.4 | HIGH | CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Progress | Connection Manager For Objectscale | All | All | All | All |
| Application | Progress | Ecs Connection Manager | All | All | All | All |
| Application | Progress | Loadmaster | All | All | All | All |
| Application | Progress | Loadmaster | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Progress Software | LoadMaster | affected 7.1.32.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | ECS Connections Manager | affected 7.2.49.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | Object Scale Connection Manager | affected 7.2.62.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | MOVEit WAF | affected 7.2.62.0 V7.2.63.0 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| community.progress.com/s/article/LoadMaster-Security-Vulnerabilites-CVE-2026-3517-CV... | [email protected] | community.progress.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Michael Argany of TrendAI Research (en)
There are currently no legacy QID mappings associated with this CVE.