Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13447: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster

0
High
VulnerabilityCVE-2025-13447cvecve-2025-13447
Published: Tue Jan 13 2026 (01/13/2026, 14:31:56 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: LoadMaster

Description

CVE-2025-13447 is a high-severity OS command injection vulnerability in Progress Software's LoadMaster appliance API. It allows an authenticated attacker with User Administration permissions to execute arbitrary OS commands by exploiting unsanitized input parameters. The vulnerability affects multiple LoadMaster versions, including 7. 1. 32, 7. 2. 37, 7. 2. 39, and 7. 2.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:43:05 UTC

Technical Analysis

CVE-2025-13447 is an OS command injection vulnerability identified in the API of Progress Software's LoadMaster appliance, a widely used application delivery controller and load balancer. The flaw arises from improper neutralization of special elements in API input parameters, allowing an attacker with authenticated User Administration privileges to inject and execute arbitrary operating system commands on the appliance. This vulnerability affects multiple versions of LoadMaster, specifically 7.1.32, 7.2.37, 7.2.39, and 7.2.50. The attack vector requires authentication but no user interaction, and the vulnerability has a CVSS v3.1 score of 8.4, reflecting high severity with critical impacts on confidentiality, integrity, and availability. The scope is significant as the vulnerability allows command execution at the OS level, potentially leading to full system compromise, data exfiltration, or disruption of load balancing services. No public exploits have been reported yet, but the presence of unsanitized input in API parameters represents a serious risk, especially in environments where User Administration permissions are widely granted. The vulnerability was reserved in November 2025 and published in January 2026, indicating recent discovery and disclosure. LoadMaster appliances are commonly deployed in enterprise and critical infrastructure environments, making this vulnerability a notable threat to organizations relying on these systems for secure and reliable application delivery.

Potential Impact

For European organizations, exploitation of CVE-2025-13447 could lead to complete compromise of LoadMaster appliances, resulting in unauthorized command execution, data breaches, and potential disruption of critical application delivery services. This could affect confidentiality by exposing sensitive configuration and operational data, integrity by allowing attackers to alter system settings or inject malicious payloads, and availability by causing service outages or denial of load balancing functionality. Organizations in sectors such as finance, healthcare, government, and telecommunications that rely heavily on LoadMaster for secure application delivery are particularly at risk. The requirement for User Administration privileges limits the attack surface but also highlights the importance of strict access controls. Given the appliance’s role in managing network traffic, successful exploitation could facilitate lateral movement within networks or serve as a foothold for broader attacks. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Apply official patches or updates from Progress Software as soon as they become available to remediate the vulnerability. 2. Immediately review and restrict User Administration permissions to the minimum necessary personnel to reduce the risk of exploitation. 3. Implement strict API access controls and monitor API usage logs for unusual or unauthorized command execution attempts. 4. Employ network segmentation to isolate LoadMaster appliances from less trusted network zones, limiting exposure. 5. Use multi-factor authentication (MFA) for accounts with User Administration privileges to reduce the risk of credential compromise. 6. Conduct regular security audits and vulnerability assessments on LoadMaster appliances to detect misconfigurations or signs of compromise. 7. Develop and test incident response plans specific to LoadMaster compromise scenarios to ensure rapid containment and recovery. 8. Consider deploying host-based intrusion detection systems (HIDS) on LoadMaster appliances if supported, to detect anomalous OS-level activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-11-19T19:18:13.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966bf90a60475309fb963dc

Added to database: 1/13/2026, 9:56:32 PM

Last enriched: 1/21/2026, 2:43:05 AM

Last updated: 2/6/2026, 12:28:12 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats