{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-7388","assignerOrgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","state":"PUBLISHED","assignerShortName":"ProgressSoftware","dateReserved":"2025-07-09T13:01:14.744Z","datePublished":"2025-09-04T13:01:13.624Z","dateUpdated":"2026-02-26T17:49:38.593Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["OpenEdge AdminServer"],"platforms":["Windows","Linux","64 bit","32 bit"],"product":"OpenEdge","vendor":"Progress Software Corporation","versions":[{"lessThan":"12.2.18","status":"affected","version":"OpenEdge 12.2.0","versionType":"custom"},{"lessThan":"12.8.8","status":"affected","version":"OpenEdge 12.8.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>It was possible to perform <b>Remote Command Execution (RCE)</b> via Java\nRMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and\nexecute OS commands under the delegated authority of the AdminServer process.&nbsp; An RMI interface permitted manipulation of a configuration\nproperty with inadequate input validation leading to OS command injection.</p>"}],"value":"It was possible to perform Remote Command Execution (RCE) via Java\nRMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and\nexecute OS commands under the delegated authority of the AdminServer process.  An RMI interface permitted manipulation of a configuration\nproperty with inadequate input validation leading to OS command injection."}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-77","description":"CWE-77","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","shortName":"ProgressSoftware","dateUpdated":"2025-09-04T13:01:13.624Z"},"references":[{"url":"https://community.progress.com/s/article/Important-RCE-Security-Update-for-OpenEdge-AdminServer"}],"source":{"discovery":"UNKNOWN"},"title":"Authenticated Command Injection via configuration parameter manipulation in exposed RMI interface","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-7388","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-09-05T03:55:49.088535Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:49:38.593Z"}}]}}