Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11235: CWE-620 Unverified Password Change in Progress MOVEit Transfer

0
Low
VulnerabilityCVE-2025-11235cvecve-2025-11235cwe-620
Published: Tue Jan 06 2026 (01/06/2026, 22:16:48 UTC)
Source: CVE Database V5
Vendor/Project: Progress
Product: MOVEit Transfer

Description

Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10.

AI-Powered Analysis

AILast updated: 01/06/2026, 22:43:46 UTC

Technical Analysis

CVE-2025-11235 is a vulnerability identified in Progress MOVEit Transfer software, specifically affecting the REST API modules on Windows platforms. The flaw is classified under CWE-620, which relates to unverified password changes. This means that the system allows password changes without adequately verifying the legitimacy of the request, potentially enabling unauthorized password modifications. The affected versions include 2023.1.0 before 2023.1.3, 2023.0.0 before 2023.0.8, 2022.1.0 before 2022.1.11, and 2022.0.0 before 2022.0.10. The vulnerability has a CVSS v3.1 base score of 3.7, indicating low severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L. This means the attack can be performed remotely over the network but requires high attack complexity, no privileges, and no user interaction. The impact is limited to availability with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no patches were linked at the time of publication. The vulnerability could allow an attacker to disrupt service by changing passwords improperly, potentially causing denial of service or administrative disruption. The REST API exposure is the attack surface, so network exposure and API access controls are critical factors.

Potential Impact

For European organizations, the primary impact of CVE-2025-11235 lies in potential disruption of MOVEit Transfer services due to unauthorized password changes. While confidentiality and integrity are not directly affected, availability could be degraded, impacting file transfer operations critical to business processes. Organizations in sectors relying heavily on secure file transfers—such as finance, healthcare, government, and legal services—may experience operational interruptions. The low CVSS score suggests limited risk of widespread exploitation, but the vulnerability could be leveraged in targeted attacks or combined with other vulnerabilities for greater impact. Given MOVEit Transfer's role in secure managed file transfers, any disruption could delay data exchanges, compliance reporting, or inter-organizational workflows. European entities with exposed REST API endpoints or insufficient network segmentation are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop automated tools.

Mitigation Recommendations

To mitigate CVE-2025-11235, European organizations should: 1) Monitor and restrict access to MOVEit Transfer REST API endpoints, limiting exposure to trusted networks and IP addresses only. 2) Implement strict network segmentation and firewall rules to reduce the attack surface. 3) Enforce strong authentication and authorization controls around password change functionalities, including multi-factor authentication where possible. 4) Regularly audit logs for unusual password change requests or API activity indicative of exploitation attempts. 5) Stay in close contact with Progress for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Consider temporary compensating controls such as disabling password changes via the REST API if feasible until patches are deployed. 7) Conduct internal penetration testing and vulnerability assessments focusing on REST API security to identify and remediate related weaknesses. 8) Educate administrators and users about the vulnerability and encourage vigilance for suspicious activity. These steps go beyond generic advice by focusing on API exposure management and proactive monitoring tailored to the specific vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-10-01T19:09:58.385Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d8cc265deeab1b941f6d5

Added to database: 1/6/2026, 10:29:22 PM

Last enriched: 1/6/2026, 10:43:46 PM

Last updated: 1/8/2026, 4:28:48 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats