Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13444: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster

0
High
VulnerabilityCVE-2025-13444cvecve-2025-13444
Published: Tue Jan 13 2026 (01/13/2026, 14:26:50 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: LoadMaster

Description

OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an authenticated attacker with “User Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the API input parameters

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:06:54 UTC

Technical Analysis

CVE-2025-13444 is an OS command injection vulnerability found in Progress Software's LoadMaster, specifically version 7.2.50. The vulnerability arises from improper neutralization of special elements in API input parameters, allowing an attacker with authenticated User Administration privileges to inject and execute arbitrary operating system commands on the LoadMaster appliance. This occurs because the API fails to sanitize input correctly before passing it to system-level command execution contexts. The vulnerability requires authentication with elevated privileges, but no user interaction is needed beyond that. The CVSS 3.1 vector (AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) indicates that the attack can be performed remotely over a network with low complexity, requires high privileges, and results in complete compromise of confidentiality, integrity, and availability with scope change. The vulnerability was reserved in November 2025 and published in January 2026. No public exploit code or active exploitation has been reported yet. LoadMaster appliances are widely used for application delivery and load balancing, making this vulnerability critical for organizations relying on them for secure network traffic management.

Potential Impact

Successful exploitation of CVE-2025-13444 allows attackers to execute arbitrary OS commands on the LoadMaster appliance, potentially leading to full system compromise. This can result in unauthorized access to sensitive configuration data, manipulation or disruption of load balancing and traffic management functions, and the ability to pivot to other internal network resources. The impact extends to confidentiality breaches, integrity violations through unauthorized changes, and availability disruptions by disabling or destabilizing the appliance. Organizations relying on LoadMaster for critical infrastructure or secure application delivery face significant operational risks, including service outages and data breaches. The requirement for User Administration privileges limits the attack surface but insider threats or compromised administrator accounts increase risk. The vulnerability’s scope change means attackers can affect resources beyond the initial vulnerable component, amplifying potential damage.

Mitigation Recommendations

To mitigate CVE-2025-13444, organizations should immediately apply any patches or updates released by Progress Software for LoadMaster version 7.2.50 or later. If patches are not yet available, restrict User Administration permissions to trusted personnel only and implement strict access controls and monitoring on the LoadMaster management interfaces. Employ network segmentation to limit exposure of the LoadMaster API to trusted networks and administrators. Enable detailed logging and alerting for suspicious API usage patterns indicative of command injection attempts. Conduct regular audits of administrator accounts and credentials to prevent unauthorized privilege escalation. Consider deploying Web Application Firewalls (WAFs) or API gateways with input validation and command injection detection capabilities to provide an additional layer of defense. Finally, maintain an incident response plan tailored to LoadMaster compromise scenarios to enable rapid containment and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-11-19T19:14:26.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966bf90a60475309fb963d6

Added to database: 1/13/2026, 9:56:32 PM

Last enriched: 2/27/2026, 7:06:54 AM

Last updated: 3/24/2026, 12:51:05 PM

Views: 202

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses