CVE-2025-10240

8.8 HIGH

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in Progress Flowmon web application that allows attackers to execute malicious scripts in authenticated users' browsers. Users who click specially crafted malicious links can trigger unintended actions within their authenticated sessions. This affects all Progress Flowmon web application users prior to version 12.5.5.

💻 Affected Systems

Products:
  • Progress Flowmon web application
Versions: All versions prior to 12.5.5
Operating Systems: All supported OS for Flowmon
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of Flowmon appliances and software installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, or administrative actions performed by attackers using the victim's authenticated session.

🟠

Likely Case

Session hijacking, unauthorized actions within the application, or data exfiltration from authenticated sessions.

🟢

If Mitigated

Limited impact with proper input validation and output encoding controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction (clicking malicious link) and authenticated session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.5.5

Vendor Advisory: https://community.progress.com/s/article/Can-CVE-2025-10240-affect-Progress-Flowmon-appliance

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Flowmon version 12.5.5 or later from Progress support portal. 3. Apply the update following vendor documentation. 4. Restart the Flowmon services or appliance.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header to web server configuration

User Awareness Training

all

Train users to avoid clicking suspicious links while authenticated

🧯 If You Can't Patch

  • Implement web application firewall with XSS protection rules
  • Restrict access to Flowmon web interface to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check Flowmon web interface version in administration panel or via CLI

Check Version:

flowmon-cli version or check web interface About page

Verify Fix Applied:

Confirm version is 12.5.5 or later and test XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags
  • Multiple failed login attempts followed by successful login from different IP

Network Indicators:

  • HTTP requests containing script tags or encoded payloads to Flowmon web endpoints

SIEM Query:

source="flowmon" AND (http_uri CONTAINS "<script>" OR http_uri CONTAINS "javascript:")

🔗 References

📤 Share & Export