Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress flowmon |
|
| Vendors & Products |
Progress
Progress flowmon |
Thu, 09 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in the Progress Flowmon web application prior to version 12.5.5, whereby a user who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated session. | |
| Title | Possibility of unintended actions when a user clicks a malicious link in the Progress Flowmon web application | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-02-26T17:47:58.397Z
Reserved: 2025-09-10T16:28:15.198Z
Link: CVE-2025-10240
Updated: 2025-10-09T13:27:38.774Z
Status : Deferred
Published: 2025-10-09T13:15:31.950
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-10240
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:17:55Z