Advisory Details

May 21st, 2026

Progress Software Kemp LoadMaster ssodomain_killsession Command Injection Remote Code Execution Vulnerability

ZDI-26-318
ZDI-CAN-29222

CVE ID CVE-2026-3518
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Progress Software
AFFECTED PRODUCTS Kemp LoadMaster
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software Kemp LoadMaster. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of the key parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the appliance.

ADDITIONAL DETAILS Progress Software has issued an update to correct this vulnerability. More details can be found at:
https://docs.progress.com/bundle/release-notes_loadmaster-7-2-63-1/page/Security-Updates.html
DISCLOSURE TIMELINE
  • 2026-02-23 - Vulnerability reported to vendor
  • 2026-05-21 - Coordinated public release of advisory
  • 2026-05-21 - Advisory Updated
CREDIT Michael Argany of TrendAI Research
BACK TO ADVISORIES