OS Command Injection Remote Code Execution Vulnerability in Progress LoadMaster, ECS Connection Manager, Object Scale Connection Manager & MOVEit WAF
Summary
| CVE | CVE-2026-3519 |
|---|---|
| State | PUBLISHED |
| Assigner | ProgressSoftware |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-20 14:16:19 UTC |
| Updated | 2026-05-01 18:09:30 UTC |
| Description | OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command |
Risk And Classification
Primary CVSS: v3.1 7.2 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000320000 probability, percentile 0.090900000 (date 2026-05-05)
Problem Types: CWE-77 | CWE-77 CWE-77
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | [email protected] | Secondary | 8.4 | HIGH | CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 8.4 | HIGH | CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Progress | Connection Manager For Objectscale | All | All | All | All |
| Application | Progress | Ecs Connection Manager | All | All | All | All |
| Application | Progress | Loadmaster | All | All | All | All |
| Application | Progress | Loadmaster | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Progress Software | LoadMaster | affected V7.2.45.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | ECS Connections Manager | affected V7.2.49.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | Object Scale Connection Manager | affected V7.2.62.0 V7.2.63.0 custom | Not specified |
| CNA | Progress Software | MOVEit WAF | affected V7.2.62.0 V7.2.63.0 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| community.progress.com/s/article/LoadMaster-Security-Vulnerabilites-CVE-2026-3517-CV... | [email protected] | community.progress.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.