Progress Patches Critical Command Injection Flaws in MOVEit WAF and LoadMaster

Progress Software Patches Multiple Command Injection and WAF Bypass Vulnerabilities in ADC Products

HIGH
April 21, 2026
4m read
VulnerabilityPatch Management

Related Entities

Organizations

Products & Tech

MOVEit WAFLoadMasterECS Connection ManagerConnection Manager for ObjectScale

Full Report

Executive Summary

Progress Software has released security updates to address five vulnerabilities across its Application Delivery Controller (ADC) product line, which includes MOVEit WAF and LoadMaster. The vulnerabilities, patched on April 20, 2026, primarily consist of authenticated command injection flaws that could allow an attacker with specific administrative permissions to achieve remote code execution (RCE) on the appliance. The patched vulnerabilities are CVE-2026-3517, CVE-2026-3519, CVE-2026-3518, and CVE-2026-4048 (command injection), and CVE-2026-21876 (WAF bypass). Given the history of Progress products being high-value targets for threat actors, organizations are strongly advised to apply the necessary updates as soon as possible.


Vulnerability Details

The patched vulnerabilities allow authenticated attackers to perform actions beyond their intended privileges, potentially leading to a full compromise of the appliance.

Command Injection Vulnerabilities

These flaws stem from the failure to properly sanitize user-supplied input in various API commands and UI functions.

  • CVE-2026-3517 & CVE-2026-3519: These are command injection flaws in the addcountry and aclcontrol API commands, respectively. An attacker with 'Geo Administration' or 'VS Administration' permissions could inject and execute arbitrary OS commands.
  • CVE-2026-3518: This flaw affects the killsession API command in LoadMaster. An authenticated attacker with 'All' permissions could execute commands due to unsanitized input.
  • CVE-2026-4048: This is a UI-based command injection vulnerability. An attacker with 'All' permissions could upload a custom WAF rule file containing malicious code, leading to command execution on the appliance.

WAF Bypass Vulnerability

  • CVE-2026-21876: This vulnerability allows for a bypass of the Web Application Firewall. The rule set designed to validate character sets in HTTP multipart request headers only checked the last header. An attacker could craft a request with a malicious payload encoded in an earlier multipart header to bypass WAF detection and potentially attack the backend application.

Affected Systems

The vulnerabilities affect a range of Progress ADC products, including:

  • MOVEit WAF
  • LoadMaster
  • ECS Connection Manager
  • Connection Manager for ObjectScale

Progress has released patched versions, including MOVEit WAF 7.2.63.0 and LoadMaster GA 7.2.63.1, to address these issues.

Exploitation Status

As of the announcement, there is no evidence that these specific vulnerabilities are being exploited in the wild. However, vulnerabilities in edge network appliances like ADCs are highly sought after by attackers as they provide a direct path into a corporate network.

Impact Assessment

While the command injection vulnerabilities require authentication, a successful exploit would be severe. An attacker who compromises a low-privileged admin account (e.g., through phishing or credential stuffing) could potentially leverage these flaws to escalate privileges and gain full root access to the appliance. From there, they could intercept, decrypt, and modify traffic passing through the device, disable security controls, or use the appliance as a pivot point to attack the internal network. The WAF bypass vulnerability (CVE-2026-21876) exposes backend web applications to a range of attacks that the WAF is intended to prevent, such as SQL injection or cross-site scripting.

Cyber Observables — Hunting Hints

The following patterns could help identify attempts to exploit these vulnerabilities:

Type
Log Source
Value
ADC Appliance Audit Logs
Description
Look for suspicious or malformed inputs related to the addcountry, aclcontrol, or killsession commands.
Context
LoadMaster/MOVEit WAF system logs.
Type
File Path
Value
Custom WAF rule files
Description
Monitor for the upload of new or modified custom WAF rule files, especially if they contain unexpected scripts or commands.
Context
File integrity monitoring on the appliance.
Type
Network Traffic Pattern
Value
Suspicious requests with multiple multipart headers using non-standard character sets.
Description
This could indicate an attempt to exploit the WAF bypass (CVE-2026-21876).
Context
WAF logs, network traffic captures.

Detection Methods

  1. Audit Log Review: Regularly review the audit logs on Progress ADC appliances for any unusual administrative activity, particularly related to the vulnerable API commands or custom WAF rule management.
  2. Vulnerability Scanning: Use vulnerability scanners to identify unpatched instances of MOVEit WAF and LoadMaster in your environment.
  3. Configuration Review: Periodically review the roles and permissions of all administrative accounts on the appliances. Ensure the principle of least privilege is followed.

Remediation Steps

  1. Apply Updates: The primary remediation is to update all affected Progress ADC products to the patched versions provided by Progress Software.
  2. Review Accounts: Audit all administrative accounts on the appliances. Remove any that are unnecessary and ensure strong, unique passwords and MFA (if available) are used for the rest.
  3. Restrict Access: Ensure the management interfaces for these appliances are not exposed to the internet and are only accessible from a secure, trusted network segment.

Timeline of Events

1
April 20, 2026
Progress Software issues security updates to address five vulnerabilities in its ADC product line.
2
April 21, 2026
This article was published

MITRE ATT&CK Mitigations

The primary and most effective mitigation is to apply the security updates provided by Progress Software.

Mapped D3FEND Techniques:

Since the vulnerabilities require authentication, auditing and limiting privileged accounts reduces the attack surface.

Mapped D3FEND Techniques:

Restrict access to the appliance's management interface to a secure, isolated network segment.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The immediate and most crucial action for all organizations using Progress MOVEit WAF, LoadMaster, or other affected ADC products is to apply the security patches released on April 20, 2026. These updates directly address the root cause of the command injection and WAF bypass vulnerabilities. Create an emergency change request to deploy the patched versions, such as MOVEit WAF 7.2.63.0 and LoadMaster GA 7.2.63.1. Prioritize patching internet-facing appliances first. Given that these are authenticated vulnerabilities, the risk may seem lower, but a determined attacker can find ways to acquire credentials. Patching is the only way to fully eliminate the risk posed by these specific CVEs.

As a powerful compensating control, organizations should conduct a thorough audit of all user accounts and permissions on their Progress ADC appliances. Since vulnerabilities like CVE-2026-3517 and CVE-2026-3519 require specific administrative roles ('Geo Administration', 'VS Administration'), enforcing the principle of least privilege is critical. Review every account with these or 'All' permissions. Do they absolutely need this level of access? Can their permissions be downgraded? Remove any dormant or unnecessary accounts. For remaining privileged accounts, ensure they are used only when necessary and that their activity is closely monitored. By minimizing the number of accounts that can access the vulnerable API functions, you significantly reduce the likelihood that a compromised account could be used to exploit these command injection flaws.

Sources & References

Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster
SecurityWeek (securityweek.com) April 21, 2026
MOVEit WAF Vulnerabilities: CVE-2025-13444 / CVE-2025-13447
Progress Community (community.progress.com) January 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Progress SoftwareMOVEitLoadMastervulnerabilitycommand injectionRCEWAF bypasspatch management

📢 Share This Article

Help others stay informed about cybersecurity threats