Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Apr 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress flowmon |
|
| CPEs | cpe:2.3:a:progress:flowmon:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress
Progress flowmon |
|
| Metrics |
cvssV3_1
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress Software
Progress Software flowmon |
|
| Vendors & Products |
Progress Software
Progress Software flowmon |
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in Progress Flowmon versions prior to 12.5.8 and 13.0.6, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session. | |
| Title | Possibility of unintended actions when an administrator clicks a malicious link in the Progress Flowmon web application | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-04-03T03:55:29.158Z
Reserved: 2026-02-19T09:21:34.082Z
Link: CVE-2026-2737
Updated: 2026-04-02T13:51:34.715Z
Status : Analyzed
Published: 2026-04-02T14:16:28.087
Modified: 2026-04-21T00:29:23.500
Link: CVE-2026-2737
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:21:13Z