Categories: Cyber Security News

Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Progress OpenEdge, a platform for developing and deploying business applications.

The flaw, identified as CVE-2025-7388, allows for remote code execution (RCE) and affects multiple versions of the software, potentially enabling attackers to execute arbitrary commands with elevated system privileges.

The vulnerability resides in the AdminServer component of OpenEdge, specifically within its Java Remote Method Invocation (RMI) interface, which is used for remote administrative tasks.

According to a security notification, the flaw allows an authenticated but unauthorized user to manipulate configuration properties. This can lead to OS command injection through the workDir parameter.

Attackers can exploit this by injecting malicious commands, which are then executed with the high-level privileges of the AdminServer process, often running as NT AUTHORITY/SYSTEM on Windows systems.

Progress OpenEdge AdminServer Vulnerability

Progress has addressed the vulnerability and released patches in OpenEdge Long-Term Support (LTS) Updates 12.2.18 and 12.8.9.

The fix involves two key changes: first, it sanitizes the workDir parameter by enclosing values in double quotes to prevent command injection. Second, it disables the remote RMI capability by default to reduce the attack surface.

All OpenEdge versions prior to these updates, including LTS Releases 12.2.17 and 12.8.8 and their earlier minor versions, are susceptible.

Systems running unpatched versions remain exposed to significant risk, as weak authentication could allow attackers to compromise the entire system.

For users who have applied the patch, remote RMI will be disabled by default. Administrators who relied on this feature for remote operations will find it no longer functions.

While it is possible to re-enable remote RMI, Progress warns that doing so reintroduces security risks and should only be done if there is a compelling business reason, at the user’s own risk.

For organizations unable to apply the updates immediately, temporary mitigations are recommended.

These include restricting network access to the AdminServer RMI port (default 20931) using firewalls, running the AdminServer process with the lowest possible privileges, and removing any unused AdminServer plugins to minimize potential attack vectors.

However, these measures are intended only for short-term use. Progress strongly advises all customers to upgrade to the patched versions to fully remediate the vulnerability.

Users of retired OpenEdge versions must upgrade to a currently supported release to receive the fix.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Watch the Moment When the Wreck of the Titanic Was First Discovered (1985)

The wreck of the RMS Titanic has never ceased to command attention, from pop-cultural fascination…

9 minutes ago

Supercharged intelligence – why RAG leads to more accurate and relevant AI chatbot responses

What is RAG, and why does it matter in AI? When organisations create a large-language model (LLM)-based…

18 minutes ago

ClickFix Evolves with 10-Year-Old Open-Source Python SOCKS5 Proxy

A cyberattack campaign that tricks users into running malicious commands on their own computers has…

19 minutes ago

Critical SandboxJS Escape Vulnerability Enables Host Takeover

A critical security flaw has been found in SandboxJS, a widely used JavaScript sandboxing library…

20 minutes ago

iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone and Android

For years, texting between an iPhone and an Android phone meant your messages traveled without…

20 minutes ago

New Exim BDAT GnuTLS Vulnerability Enables Code Execution Attacks

A serious security flaw has been found in Exim, one of the most widely deployed…

20 minutes ago

This website uses cookies.