Skip to main content

CVE-2025-7388: CWE-77 in Progress Software Corporation OpenEdge

High
VulnerabilityCVE-2025-7388cvecve-2025-7388cwe-77
Published: Thu Sep 04 2025 (09/04/2025, 13:01:13 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: OpenEdge

Description

It was possible to perform Remote Command Execution (RCE) via Java RMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and execute OS commands under the delegated authority of the AdminServer process.  An RMI interface permitted manipulation of a configuration property with inadequate input validation leading to OS command injection.

AI-Powered Analysis

AILast updated: 09/04/2025, 13:06:56 UTC

Technical Analysis

CVE-2025-7388 is a high-severity vulnerability affecting Progress Software Corporation's OpenEdge product, specifically versions 12.2.0 and 12.8.0. The vulnerability arises from improper input validation in the Java Remote Method Invocation (RMI) interface of the OpenEdge AdminServer. Authenticated users can exploit this flaw to perform Remote Command Execution (RCE) by injecting operating system commands through manipulation of a configuration property exposed via the RMI interface. This vulnerability is classified under CWE-77, which pertains to OS Command Injection. The RMI interface allows remote communication between Java applications, and in this case, it permits modification of configuration parameters without sufficient sanitization, enabling attackers to execute arbitrary OS commands with the privileges of the AdminServer process. The CVSS v3.1 base score is 8.4, indicating a high severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L) shows that the attack can be performed remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation requires specific conditions or knowledge. The vulnerability impacts confidentiality and integrity severely (C:H/I:H) and availability to a lesser extent (A:L). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability's scope is changed (S:C), indicating that the impact extends beyond the vulnerable component to other parts of the system or network. This vulnerability is critical for organizations using OpenEdge AdminServer, as it can lead to unauthorized command execution, potentially compromising entire systems or networks.

Potential Impact

For European organizations using Progress OpenEdge versions 12.2.0 or 12.8.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized execution of OS commands, potentially allowing attackers to escalate privileges, access sensitive data, disrupt business operations, or move laterally within the network. Given OpenEdge's use in enterprise environments for database and application development, critical business applications could be compromised, affecting data confidentiality and integrity. The high confidentiality and integrity impact means sensitive customer, financial, or operational data could be exposed or altered. The limited availability impact suggests some disruption but not complete denial of service. The requirement for authentication and high attack complexity somewhat limits exploitation to insiders or attackers who have obtained credentials, but the lack of user interaction needed increases risk from automated or scripted attacks once credentials are compromised. European organizations in sectors such as finance, manufacturing, and government that rely on OpenEdge for critical applications are particularly at risk. The vulnerability could also be leveraged in targeted attacks or espionage campaigns, especially given the scope change that may affect interconnected systems.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the OpenEdge AdminServer RMI interface to trusted administrators only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication and credential management policies to prevent unauthorized access to the AdminServer. 3. Monitor logs and network traffic for unusual RMI activity or command execution attempts. 4. Apply principle of least privilege to the AdminServer process to minimize the impact of potential command execution. 5. Since no official patches are currently linked, organizations should engage with Progress Software for updates or workarounds. 6. Consider deploying application-layer firewalls or RMI-specific security controls that can detect and block command injection patterns. 7. Conduct thorough security assessments and penetration testing focusing on the RMI interface to identify any exploitation attempts. 8. Prepare incident response plans specifically addressing potential RCE scenarios in OpenEdge environments. 9. Educate administrators about the risks of this vulnerability and the importance of secure configuration and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2025-07-09T13:01:14.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b98edd1baff54e4f42af0a

Added to database: 9/4/2025, 1:06:37 PM

Last enriched: 9/4/2025, 1:06:56 PM

Last updated: 9/4/2025, 10:24:25 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats