Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13774: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Progress Software Flowmon ADS

0
High
VulnerabilityCVE-2025-13774cvecve-2025-13774cwe-89
Published: Tue Jan 13 2026 (01/13/2026, 12:59:51 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: Flowmon ADS

Description

A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.4 and 13.0.1 where an SQL injection vulnerability allows authenticated users to execute unintended SQL queries and commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:07:31 UTC

Technical Analysis

CVE-2025-13774 is an SQL injection vulnerability identified in Progress Software's Flowmon ADS product, specifically affecting versions prior to 12.5.4 and 13.0.1. The vulnerability stems from improper neutralization of special elements in SQL commands (CWE-89), allowing authenticated users to inject malicious SQL queries. This flaw enables attackers with valid credentials to execute unintended SQL commands against the backend database, potentially leading to unauthorized data disclosure, data manipulation, or deletion, and disruption of service. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacts on confidentiality, integrity, and availability. The scope is unchanged, meaning the impact is confined to the vulnerable component. No public exploits have been reported yet, but the ease of exploitation by authenticated users makes this a significant threat. Flowmon ADS is widely used for network traffic monitoring and anomaly detection, making the integrity and availability of its data critical for security operations. The vulnerability could allow attackers to manipulate monitoring data or disrupt network visibility, undermining security posture. The lack of available patches at the time of reporting necessitates immediate attention to upgrade once patches are released or implement compensating controls.

Potential Impact

The potential impact of CVE-2025-13774 is substantial for organizations relying on Flowmon ADS for network monitoring and security analytics. Successful exploitation can lead to unauthorized access to sensitive monitoring data, modification or deletion of critical records, and disruption of network visibility services. This compromises the confidentiality, integrity, and availability of security monitoring functions, potentially allowing attackers to hide malicious activity or cause denial of service. Given that the vulnerability requires authentication but has low complexity and no user interaction, insider threats or compromised credentials could be leveraged to exploit this flaw. The disruption of network monitoring can delay incident detection and response, increasing the risk of broader security breaches. Organizations in sectors with high dependency on network security monitoring, such as finance, telecommunications, government, and critical infrastructure, face heightened risks. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing the vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-13774, organizations should: 1) Immediately plan and apply the official patches released in Flowmon ADS versions 12.5.4 and 13.0.1 as soon as they become available. 2) Restrict access to the Flowmon ADS management interfaces to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3) Implement strict role-based access controls to limit privileges of authenticated users, minimizing the potential impact of exploitation. 4) Monitor database query logs and application logs for unusual or unauthorized SQL commands that may indicate attempted exploitation. 5) Conduct regular credential audits and enforce password hygiene to prevent misuse of legitimate accounts. 6) Consider network segmentation to isolate Flowmon ADS from less trusted network segments. 7) Employ Web Application Firewalls (WAFs) or database activity monitoring tools that can detect and block SQL injection attempts as an additional layer of defense. 8) Educate administrators and security personnel about the vulnerability and signs of exploitation to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-11-28T10:47:19.982Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966562fa60475309f43a468

Added to database: 1/13/2026, 2:26:55 PM

Last enriched: 2/27/2026, 7:07:31 AM

Last updated: 3/26/2026, 4:41:40 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses