CVE-2025-10240
📋 TL;DR
This is a cross-site scripting (XSS) vulnerability in Progress Flowmon web application that allows attackers to execute malicious scripts in authenticated users' browsers. Users who click specially crafted malicious links can trigger unintended actions within their authenticated sessions. This affects all Progress Flowmon web application users prior to version 12.5.5.
💻 Affected Systems
- Progress Flowmon web application
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover, data theft, or administrative actions performed by attackers using the victim's authenticated session.
Likely Case
Session hijacking, unauthorized actions within the application, or data exfiltration from authenticated sessions.
If Mitigated
Limited impact with proper input validation and output encoding controls in place.
🎯 Exploit Status
Requires user interaction (clicking malicious link) and authenticated session.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.5.5
Vendor Advisory: https://community.progress.com/s/article/Can-CVE-2025-10240-affect-Progress-Flowmon-appliance
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download and install Flowmon version 12.5.5 or later from Progress support portal. 3. Apply the update following vendor documentation. 4. Restart the Flowmon services or appliance.
🔧 Temporary Workarounds
Implement Content Security Policy
allAdd CSP headers to restrict script execution sources
Add 'Content-Security-Policy' header to web server configuration
User Awareness Training
allTrain users to avoid clicking suspicious links while authenticated
🧯 If You Can't Patch
- Implement web application firewall with XSS protection rules
- Restrict access to Flowmon web interface to trusted networks only
🔍 How to Verify
Check if Vulnerable:
Check Flowmon web interface version in administration panel or via CLI
Check Version:
flowmon-cli version or check web interface About page
Verify Fix Applied:
Confirm version is 12.5.5 or later and test XSS payloads are properly sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests with script tags
- Multiple failed login attempts followed by successful login from different IP
Network Indicators:
- HTTP requests containing script tags or encoded payloads to Flowmon web endpoints
SIEM Query:
source="flowmon" AND (http_uri CONTAINS "<script>" OR http_uri CONTAINS "javascript:")