Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13774: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Progress Software Flowmon ADS

0
High
VulnerabilityCVE-2025-13774cvecve-2025-13774cwe-89
Published: Tue Jan 13 2026 (01/13/2026, 12:59:51 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software
Product: Flowmon ADS

Description

CVE-2025-13774 is a high-severity SQL injection vulnerability affecting Progress Software's Flowmon ADS versions prior to 12. 5. 4 and 13. 0. 1. Authenticated users can exploit this flaw to execute arbitrary SQL commands, potentially compromising confidentiality, integrity, and availability of the system. The vulnerability requires low attack complexity and no user interaction, making it a significant risk in environments where Flowmon ADS is deployed. No known exploits are currently reported in the wild, but the impact could be severe if exploited. European organizations using vulnerable versions should prioritize patching and implement strict access controls. Countries with high adoption of Progress Software products and critical infrastructure monitoring are at greater risk.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:43:18 UTC

Technical Analysis

CVE-2025-13774 is an SQL injection vulnerability identified in Progress Software's Flowmon ADS, a network monitoring and security analytics platform. The flaw exists in versions prior to 12.5.4 and 13.0.1, allowing authenticated users to inject malicious SQL commands due to improper neutralization of special elements in SQL queries (CWE-89). This vulnerability enables attackers with valid credentials to execute unintended SQL queries, potentially leading to unauthorized data access, modification, or deletion, as well as disruption of service. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no requirement for user interaction. The scope is unchanged, meaning the attack affects only the vulnerable component. Although no public exploits are currently known, the risk is significant given the nature of SQL injection and the privileged access required. Flowmon ADS is widely used in network security monitoring, making this vulnerability critical for organizations relying on it for threat detection and network visibility. The vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery and disclosure. The lack of patch links suggests that users must obtain updates directly from Progress Software or their support channels.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to sensitive network monitoring data, manipulation or deletion of logs, and potential disruption of network security operations. This can undermine incident detection and response capabilities, increasing the risk of undetected cyberattacks. Confidentiality breaches could expose critical infrastructure details or personal data, violating GDPR and other data protection regulations. Integrity compromises might allow attackers to falsify monitoring data, leading to incorrect security assessments. Availability impacts could disrupt network monitoring services, affecting business continuity. Organizations in sectors such as finance, energy, telecommunications, and government, which heavily rely on Flowmon ADS for network security, are particularly at risk. The requirement for authenticated access limits exposure but insider threats or compromised credentials could facilitate exploitation. The absence of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately upgrade Flowmon ADS to versions 12.5.4 or 13.0.1 or later, where the vulnerability is fixed. 2. Restrict access to Flowmon ADS interfaces strictly to trusted administrators and monitor authentication logs for unusual activity. 3. Implement the principle of least privilege for all users with access to Flowmon ADS, ensuring only necessary permissions are granted. 4. Employ network segmentation to isolate Flowmon ADS management interfaces from general user networks. 5. Enable and regularly review database query logs to detect anomalous or suspicious SQL commands indicative of exploitation attempts. 6. Use Web Application Firewalls (WAFs) or database activity monitoring tools that can detect and block SQL injection patterns targeting Flowmon ADS. 7. Conduct regular security audits and penetration testing focusing on authentication mechanisms and input validation in Flowmon ADS. 8. Educate administrators about the risks of credential compromise and enforce strong authentication methods, such as multi-factor authentication (MFA). 9. Coordinate with Progress Software support for any interim patches or workarounds until official updates are applied. 10. Prepare incident response plans specifically addressing potential SQL injection exploitation scenarios in network monitoring systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-11-28T10:47:19.982Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966562fa60475309f43a468

Added to database: 1/13/2026, 2:26:55 PM

Last enriched: 1/21/2026, 2:43:18 AM

Last updated: 2/7/2026, 2:13:31 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats