Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress Software
Progress Software flowmon Ads |
|
| Vendors & Products |
Progress Software
Progress Software flowmon Ads |
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session. | |
| Title | Possibility of unintended actions when an administrator clicks a malicious link in the Progress Flowmon ADS web application | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-03-13T03:55:42.297Z
Reserved: 2026-02-14T09:56:23.317Z
Link: CVE-2026-2513
Updated: 2026-03-12T14:11:50.761Z
Status : Awaiting Analysis
Published: 2026-03-12T13:16:14.023
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-2513
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:49:49Z