Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10240: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Progress Software Flowmon

0
High
VulnerabilityCVE-2025-10240cvecve-2025-10240cwe-79
Published: Thu Oct 09 2025 (10/09/2025, 12:43:40 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: Flowmon

Description

A vulnerability exists in the Progress Flowmon web application prior to version 12.5.5, whereby a user who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated session.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:07:12 UTC

Technical Analysis

CVE-2025-10240 is a cross-site scripting (XSS) vulnerability identified in Progress Software's Flowmon web application, affecting all versions prior to 12.5.5. The root cause is improper neutralization of user-supplied input during web page generation, classified under CWE-79. This flaw allows an attacker to craft a malicious URL containing executable script code. When an authenticated user clicks this link, the malicious script executes within the context of the user's session, potentially leading to session hijacking, unauthorized actions, or data exfiltration. The vulnerability requires no special privileges (PR:N) but does require user interaction (UI:R), such as clicking the malicious link. The attack vector is network-based (AV:N), meaning exploitation can be performed remotely over the internet. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can steal sensitive information, manipulate data, or disrupt services. Although no exploits have been reported in the wild yet, the high CVSS score of 8.8 underscores the criticality of this issue. Flowmon is widely used for network monitoring and security analytics, making this vulnerability particularly concerning for organizations relying on it for critical infrastructure monitoring. The vendor has reserved the CVE and published the vulnerability details but has not yet released a patch as of the published date. Immediate mitigation and monitoring are advised until an official patch is available.

Potential Impact

The impact of CVE-2025-10240 is significant for organizations worldwide that deploy Progress Flowmon for network monitoring and security analytics. Successful exploitation can lead to unauthorized disclosure of sensitive information, including session tokens and user data, compromising confidentiality. Attackers may also perform unauthorized actions on behalf of the user, affecting data integrity and potentially disrupting monitoring services, impacting availability. This can undermine trust in network security monitoring and expose organizations to further attacks. Given Flowmon's role in critical infrastructure and enterprise environments, exploitation could facilitate lateral movement within networks or enable attackers to bypass security controls. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns could be highly effective. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that the vulnerability is easy to exploit remotely and can cause severe damage if leveraged.

Mitigation Recommendations

Organizations should immediately upgrade Flowmon to version 12.5.5 or later once the patch is available to fully remediate the vulnerability. Until then, implement strict input validation and output encoding on all user-supplied data within the application environment, if possible. Employ web application firewalls (WAFs) configured with rules to detect and block XSS attack patterns targeting Flowmon interfaces. Educate users to avoid clicking suspicious or unsolicited links, especially those purporting to relate to Flowmon or network monitoring. Monitor logs and network traffic for unusual activity indicative of attempted exploitation, such as anomalous URL parameters or script injections. Restrict access to the Flowmon web interface to trusted networks and enforce multi-factor authentication to reduce the risk of session compromise. Regularly review and update security policies to include protections against social engineering attacks that could deliver malicious links. Coordinate with Progress Software for timely patch deployment and stay informed on any emerging exploit reports.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2025-09-10T16:28:15.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7b3ceba0e608b4f9b09a4

Added to database: 10/9/2025, 1:08:30 PM

Last enriched: 2/26/2026, 10:07:12 PM

Last updated: 3/26/2026, 12:47:08 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses