Known issues in OpenEdge 12.8.11
- Last Updated: March 12, 2026
- 1 minute read
- OpenEdge
- Documentation
Click here for a list of the fixed issues.
The following table lists the release notes for this release:
| Component | Issue Number | Description |
|---|---|---|
| Security | OCTA-80320 |
Important Notice – Breaking Change Do not install OpenEdge 12.8.11 or later before reviewing this information. OpenEdge 12.8.11 introduces a breaking security change that permanently removes support for the OECH1 encoding algorithm. This change is required to remediate a known security vulnerability. Once this update is applied, any use of OECH1‑encoded values will result in runtime errors and may prevent OpenEdge components from running. Progress strongly recommends that a migration plan is created and tested prior to installing this update in production to avoid service disruption. Progress Software strongly recommends taking a full backup of your system before applying the update to manage any migration errors where the update must be restarted. Security Update Overview The OECH1 encoding algorithm, historically used to obfuscate administrative system passwords and sensitive configuration values, has been identified as cryptographically weak and unsuitable for enterprise use. CVE‑2025‑8095 demonstrates that OECH1‑encoded values can be exploited and must be considered compromised. Beginning with OpenEdge 12.8.11, OECH1 is permanently removed across the platform. Key points:
User accounts managed by OpenEdge
( Affected Versions All OpenEdge 12.8.x versions prior to 12.8.11 are subject to this vulnerability. Upgrading to 12.8.11 without first remediating OECH1 usage will result in system startup or runtime failures. Behavior Changes in OpenEdge 12.8.11
This release is not backward compatible with deployments that rely on OECH1. Customer Update Requirements for Remediation Customers must identify and replace all customer‑managed OECH1‑encoded values prior to production deployment. Common usage locations include:
Common OECH1 Use Cases Customer‑managed OECH1 usage typically includes:
Additional sources:
Migration Guidance for Remediation Recommended Upgrade Flow to 12.8.11
If upgrading from OpenEdge 11.x, complete the standard upgrade process to OpenEdge 12 before addressing OECH1 remediation. Finding OECH1 Usage Before upgrading, customers should perform a comprehensive scan of their OpenEdge installation directories to proactively locate OECH1‑encoded values. Configuration files are the most common source of latent OECH1 dependencies that may not surface until specific services are started. After static scanning, runtime testing should be performed to identify any remaining usage reported in OpenEdge or system logs. Security Risk Statement Continuing to use OECH1 significantly weakens the security posture of OpenEdge environments. OECH1‑encoded credentials should be treated as compromised. Re‑encoding historical OECH1 values without changing the underlying secret does not mitigate risk. If attackers obtain earlier OECH1‑encoded values, they may still exploit updated deployments. Customers are advised to:
Summary OpenEdge 12.8.11 is a backward‑incompatible release that introduces a mandatory security remediation. Failure to migrate OECH1‑encoded values before applying this update will result in runtime errors and service outages. Customers must plan and execute migration activities carefully to ensure continued system availability. |
| PDSOE | OCTA-87217 |
Summary OpenEdge 12.8.11 upgrades the underlying Eclipse Platform to version 4.34. As a result of this platform change, Progress Developer Studio for OpenEdge (PDSOE) does not migrate custom Eclipse plug-ins, third‑party extensions, or workspace associations from releases prior to 12.8.11. Description In the 12.8.11 release, PDSOE is built on Eclipse 4.34 to
incorporate security updates and align with a later, more
stable Eclipse platform. This upgrade introduces certain
behavior changes that affect existing PDSOE
configurations:
This represents a backward‑incompatible change which needs to be managed by the user. Impact After installing OpenEdge 12.8.11, users upgrading from
earlier releases must reinstall or reconfigure the following
in PDSOE:
Required Customer Actions Before installing OpenEdge 12.8.11, users should perform the
following tasks:
|