CVE-2025-7388

was · was Multiple Products

A high-severity vulnerability has been identified in multiple products from the vendor "was," specifically impacting the OpenEdge AdminServer component.

Executive summary

A high-severity vulnerability has been identified in multiple products from the vendor "was," specifically impacting the OpenEdge AdminServer component. This flaw allows an authenticated attacker to remotely execute arbitrary operating system commands, potentially leading to a complete compromise of the affected server, data theft, and further network intrusion.

Vulnerability

The vulnerability exists within the Java Remote Method Invocation (RMI) interface of the OpenEdge AdminServer. An attacker who has successfully authenticated to this interface can craft a malicious request that injects and executes arbitrary operating system commands. These commands will run with the same privileges as the AdminServer process, which is often a highly privileged account, granting the attacker significant control over the underlying server.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.4. Successful exploitation could have a severe impact on the business, leading to a full system compromise. Potential consequences include unauthorized access to and exfiltration of sensitive data, deployment of ransomware or other malware, disruption of critical business services managed by the AdminServer, and the ability for an attacker to use the compromised server as a pivot point to move laterally within the corporate network.

Remediation

Immediate Action: The primary and most effective remediation is to apply the security updates provided by the vendor across all affected systems immediately. Prioritize patching for systems that are exposed to the internet or accessible from less trusted network zones. After patching, review system and application logs for any signs of compromise that may have occurred before the patch was applied.

Proactive Monitoring: Security teams should monitor for indicators of compromise related to this vulnerability. This includes reviewing AdminServer access logs for unusual or unauthorized authentication events, monitoring for unexpected child processes being spawned by the AdminServer process (e.g., cmd.exe, /bin/sh, powershell.exe), and analyzing network traffic to the Java RMI port for suspicious patterns or connections from untrusted sources.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the OpenEdge AdminServer's Java RMI interface, allowing connections only from a limited set of trusted administrative IP addresses using host-based or network firewalls. Enforce multi-factor authentication (MFA) for all administrative accounts that can access the AdminServer to mitigate the risk of credential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the critical impact of a successful RCE attack, this vulnerability poses a significant risk to the organization. Although it is not currently listed in the CISA KEV catalog and requires authentication, we strongly recommend that the vendor-supplied patches be applied as an emergency change. Organizations should treat this as a critical priority and immediately begin patching or implementing the recommended compensating controls to prevent potential system compromise.