Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11235: CWE-620 Unverified Password Change in Progress MOVEit Transfer

0
Low
VulnerabilityCVE-2025-11235cvecve-2025-11235cwe-620
Published: Tue Jan 06 2026 (01/06/2026, 22:16:48 UTC)
Source: CVE Database V5
Vendor/Project: Progress
Product: MOVEit Transfer

Description

Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:37:57 UTC

Technical Analysis

CVE-2025-11235 is a vulnerability identified in Progress MOVEit Transfer software, specifically affecting Windows deployments of the REST API modules. The flaw is categorized under CWE-620, which pertains to unverified password changes. This means that the software allows password changes without adequately verifying the legitimacy of the request, potentially enabling unauthorized password resets. The affected MOVEit Transfer versions include 2023.1.0 before 2023.1.3, 2023.0.0 before 2023.0.8, 2022.1.0 before 2022.1.11, and 2022.0.0 before 2022.0.10. The vulnerability has a CVSS 3.1 base score of 3.7, indicating low severity. The vector details (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) show that the attack can be performed remotely over the network but requires high attack complexity, no privileges, and no user interaction. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no patches were linked at the time of reporting. The vulnerability could allow an attacker to disrupt service by triggering unauthorized password changes, potentially causing denial of service or administrative confusion. However, the high complexity and lack of privilege requirements reduce the likelihood of exploitation. MOVEit Transfer is widely used for secure file transfer in enterprises, making this vulnerability relevant for organizations relying on it for critical data exchange.

Potential Impact

For European organizations, the primary impact of CVE-2025-11235 lies in potential availability disruptions of MOVEit Transfer services. Since MOVEit Transfer is commonly used for secure file transfers in sectors such as finance, government, healthcare, and critical infrastructure, any service interruption could delay sensitive data exchanges and operational workflows. Although the vulnerability does not compromise confidentiality or integrity, denial of service or administrative confusion caused by unauthorized password changes could lead to temporary loss of access or increased support overhead. Organizations with high dependency on MOVEit Transfer for compliance-driven data transfers may face regulatory scrutiny if service disruptions affect data delivery timelines. The low severity and high attack complexity reduce immediate risk, but unpatched systems remain vulnerable to targeted disruption attempts. European entities operating MOVEit Transfer in multi-tenant or cloud environments should be cautious of potential lateral impacts if attackers exploit this flaw to cause cascading service interruptions.

Mitigation Recommendations

1. Apply official patches from Progress as soon as they become available for the affected MOVEit Transfer versions. 2. Restrict network access to the REST API endpoints by implementing firewall rules or network segmentation to limit exposure only to trusted management and integration systems. 3. Monitor logs and audit trails for unusual or repeated password change requests, especially those originating from unexpected IP addresses or outside normal operational hours. 4. Enforce strong authentication and authorization controls around administrative interfaces to reduce the risk of unauthorized access attempts. 5. Consider implementing multi-factor authentication (MFA) for administrative accounts to add an additional layer of verification. 6. Regularly review and update MOVEit Transfer configurations to disable or limit unnecessary API functionalities. 7. Conduct internal security awareness and incident response drills to prepare for potential service disruptions. 8. Engage with Progress support channels for guidance and early access to patches or workarounds. These steps go beyond generic advice by focusing on network-level protections, monitoring, and operational readiness specific to the MOVEit Transfer environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-10-01T19:09:58.385Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d8cc265deeab1b941f6d5

Added to database: 1/6/2026, 10:29:22 PM

Last enriched: 1/14/2026, 1:37:57 AM

Last updated: 2/6/2026, 5:52:02 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats