CVE-2026-3692
Published: 02 April 2026
Summary
CVE-2026-3692 is a high-severity OS Command Injection (CWE-78) vulnerability in Progress Flowmon. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by identifying, reporting, and correcting the command injection flaw through timely patching or upgrading to Flowmon 12.5.8 or later.
Enforces input validation at the report generation interface to block crafted malicious requests that inject and execute unintended commands.
Limits the impact of command injection by ensuring low-privileged users and processes have only necessary privileges to execute server commands.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in report generation enables exploitation of public-facing application (T1190) for remote code execution via command interpreter (T1059) and privilege escalation from low-priv to server compromise (T1068).
NVD Description
In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
Deeper analysisAI
CVE-2026-3692 is a command injection vulnerability (CWE-78) affecting Progress Flowmon versions prior to 12.5.8. It occurs during the report generation process, where an authenticated low-privileged user can craft a malicious request that causes unintended commands to be executed on the server. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete server compromise.
An attacker with low-privileged authenticated access to the Flowmon system can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting a specially designed request during report generation, the attacker can execute arbitrary commands on the underlying server, potentially leading to high-impact confidentiality, integrity, and availability violations, such as data exfiltration, modification, or denial of service.
The Progress advisory at https://community.progress.com/s/article/CVE-2026-3692-Progress-Flowmon recommends upgrading to Flowmon version 12.5.8 or later to mitigate the vulnerability.
Details
- CWE(s)