Progress Software has released security updates to address five vulnerabilities across its Application Delivery Controller (ADC) product line, which includes MOVEit WAF and LoadMaster. The vulnerabilities, patched on April 20, 2026, primarily consist of authenticated command injection flaws that could allow an attacker with specific administrative permissions to achieve remote code execution (RCE) on the appliance. The patched vulnerabilities are CVE-2026-3517, CVE-2026-3519, CVE-2026-3518, and CVE-2026-4048 (command injection), and CVE-2026-21876 (WAF bypass). Given the history of Progress products being high-value targets for threat actors, organizations are strongly advised to apply the necessary updates as soon as possible.
The patched vulnerabilities allow authenticated attackers to perform actions beyond their intended privileges, potentially leading to a full compromise of the appliance.
These flaws stem from the failure to properly sanitize user-supplied input in various API commands and UI functions.
addcountry and aclcontrol API commands, respectively. An attacker with 'Geo Administration' or 'VS Administration' permissions could inject and execute arbitrary OS commands.killsession API command in LoadMaster. An authenticated attacker with 'All' permissions could execute commands due to unsanitized input.The vulnerabilities affect a range of Progress ADC products, including:
Progress has released patched versions, including MOVEit WAF 7.2.63.0 and LoadMaster GA 7.2.63.1, to address these issues.
As of the announcement, there is no evidence that these specific vulnerabilities are being exploited in the wild. However, vulnerabilities in edge network appliances like ADCs are highly sought after by attackers as they provide a direct path into a corporate network.
While the command injection vulnerabilities require authentication, a successful exploit would be severe. An attacker who compromises a low-privileged admin account (e.g., through phishing or credential stuffing) could potentially leverage these flaws to escalate privileges and gain full root access to the appliance. From there, they could intercept, decrypt, and modify traffic passing through the device, disable security controls, or use the appliance as a pivot point to attack the internal network. The WAF bypass vulnerability (CVE-2026-21876) exposes backend web applications to a range of attacks that the WAF is intended to prevent, such as SQL injection or cross-site scripting.
The following patterns could help identify attempts to exploit these vulnerabilities:
addcountry, aclcontrol, or killsession commands.The primary and most effective mitigation is to apply the security updates provided by Progress Software.
Mapped D3FEND Techniques:
Since the vulnerabilities require authentication, auditing and limiting privileged accounts reduces the attack surface.
Restrict access to the appliance's management interface to a secure, isolated network segment.
Mapped D3FEND Techniques:
The immediate and most crucial action for all organizations using Progress MOVEit WAF, LoadMaster, or other affected ADC products is to apply the security patches released on April 20, 2026. These updates directly address the root cause of the command injection and WAF bypass vulnerabilities. Create an emergency change request to deploy the patched versions, such as MOVEit WAF 7.2.63.0 and LoadMaster GA 7.2.63.1. Prioritize patching internet-facing appliances first. Given that these are authenticated vulnerabilities, the risk may seem lower, but a determined attacker can find ways to acquire credentials. Patching is the only way to fully eliminate the risk posed by these specific CVEs.
As a powerful compensating control, organizations should conduct a thorough audit of all user accounts and permissions on their Progress ADC appliances. Since vulnerabilities like CVE-2026-3517 and CVE-2026-3519 require specific administrative roles ('Geo Administration', 'VS Administration'), enforcing the principle of least privilege is critical. Review every account with these or 'All' permissions. Do they absolutely need this level of access? Can their permissions be downgraded? Remove any dormant or unnecessary accounts. For remaining privileged accounts, ensure they are used only when necessary and that their activity is closely monitored. By minimizing the number of accounts that can access the vulnerable API functions, you significantly reduce the likelihood that a compromised account could be used to exploit these command injection flaws.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats