CVE-2023-49943: n/a in n/a
Zoho ManageEngine ServiceDesk Plus MSP before 14504 allows stored XSS (by a low-privileged technician) via a task's name in a time sheet.
AI Analysis
Technical Summary
CVE-2023-49943 is a stored Cross-Site Scripting (XSS) vulnerability affecting Zoho ManageEngine ServiceDesk Plus MSP versions prior to build 14504. This vulnerability allows a low-privileged technician user to inject malicious script code via the name field of a task within a time sheet. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization or encoding, enabling execution of attacker-controlled scripts in the context of other users' browsers. In this case, the vulnerability arises because the application fails to properly validate or encode the task name before displaying it, allowing persistent script injection. The CVSS 3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. Exploitation requires a low-privileged technician to create or modify a task name with malicious payload, which then executes when viewed by other users, potentially allowing session hijacking, credential theft, or unauthorized actions. No known exploits in the wild have been reported yet, and no official patch links are provided in the source information, suggesting that organizations should verify and apply vendor updates promptly once available. The underlying weakness is CWE-79, which is a common web application security flaw related to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Zoho ManageEngine ServiceDesk Plus MSP, this vulnerability poses a risk of unauthorized access and data compromise within their IT service management environment. Since the vulnerability allows a low-privileged technician to inject scripts that execute in the browsers of other users, it can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with the privileges of the victim user. This can undermine the confidentiality and integrity of service desk operations, potentially exposing sensitive customer or internal data. The impact is particularly significant in regulated industries such as finance, healthcare, and government sectors in Europe, where data protection and service availability are critical. Additionally, the scope change in the CVSS vector suggests that the vulnerability could affect multiple components or user roles, increasing the risk of lateral movement or privilege escalation within the application. Although no availability impact is indicated, the breach of confidentiality and integrity can disrupt business processes and damage organizational reputation. The requirement for user interaction (viewing the malicious task name) means that social engineering or internal awareness is a factor, but the low privilege needed to inject the payload lowers the barrier to exploitation. Overall, this vulnerability can facilitate targeted attacks against European organizations relying on this software for IT service management, especially those with multiple technicians and users accessing the platform regularly.
Mitigation Recommendations
To mitigate CVE-2023-49943 effectively, European organizations should take the following specific actions: 1) Immediately verify the current version of Zoho ManageEngine ServiceDesk Plus MSP in use and plan to upgrade to build 14504 or later once the vendor releases a patch addressing this vulnerability. 2) Until a patch is applied, restrict the ability of low-privileged technicians to create or modify task names or implement strict input validation and sanitization at the application or proxy level to block malicious scripts. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context, reducing the impact of any injected XSS payloads. 4) Conduct user awareness training for technicians and service desk users to recognize suspicious inputs or behaviors and report anomalies promptly. 5) Monitor application logs and user activities for unusual task name changes or script injection attempts. 6) Employ web application firewalls (WAFs) with rules targeting stored XSS patterns specific to ManageEngine ServiceDesk Plus MSP. 7) Review and tighten role-based access controls to minimize unnecessary privileges for technicians and other users. 8) Regularly audit and test the application for XSS and other injection vulnerabilities as part of the security program. These targeted measures go beyond generic advice by focusing on immediate containment, access control, and layered defenses until the official patch is deployed.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2023-49943: n/a in n/a
Description
Zoho ManageEngine ServiceDesk Plus MSP before 14504 allows stored XSS (by a low-privileged technician) via a task's name in a time sheet.
AI-Powered Analysis
Technical Analysis
CVE-2023-49943 is a stored Cross-Site Scripting (XSS) vulnerability affecting Zoho ManageEngine ServiceDesk Plus MSP versions prior to build 14504. This vulnerability allows a low-privileged technician user to inject malicious script code via the name field of a task within a time sheet. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization or encoding, enabling execution of attacker-controlled scripts in the context of other users' browsers. In this case, the vulnerability arises because the application fails to properly validate or encode the task name before displaying it, allowing persistent script injection. The CVSS 3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. Exploitation requires a low-privileged technician to create or modify a task name with malicious payload, which then executes when viewed by other users, potentially allowing session hijacking, credential theft, or unauthorized actions. No known exploits in the wild have been reported yet, and no official patch links are provided in the source information, suggesting that organizations should verify and apply vendor updates promptly once available. The underlying weakness is CWE-79, which is a common web application security flaw related to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Zoho ManageEngine ServiceDesk Plus MSP, this vulnerability poses a risk of unauthorized access and data compromise within their IT service management environment. Since the vulnerability allows a low-privileged technician to inject scripts that execute in the browsers of other users, it can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with the privileges of the victim user. This can undermine the confidentiality and integrity of service desk operations, potentially exposing sensitive customer or internal data. The impact is particularly significant in regulated industries such as finance, healthcare, and government sectors in Europe, where data protection and service availability are critical. Additionally, the scope change in the CVSS vector suggests that the vulnerability could affect multiple components or user roles, increasing the risk of lateral movement or privilege escalation within the application. Although no availability impact is indicated, the breach of confidentiality and integrity can disrupt business processes and damage organizational reputation. The requirement for user interaction (viewing the malicious task name) means that social engineering or internal awareness is a factor, but the low privilege needed to inject the payload lowers the barrier to exploitation. Overall, this vulnerability can facilitate targeted attacks against European organizations relying on this software for IT service management, especially those with multiple technicians and users accessing the platform regularly.
Mitigation Recommendations
To mitigate CVE-2023-49943 effectively, European organizations should take the following specific actions: 1) Immediately verify the current version of Zoho ManageEngine ServiceDesk Plus MSP in use and plan to upgrade to build 14504 or later once the vendor releases a patch addressing this vulnerability. 2) Until a patch is applied, restrict the ability of low-privileged technicians to create or modify task names or implement strict input validation and sanitization at the application or proxy level to block malicious scripts. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context, reducing the impact of any injected XSS payloads. 4) Conduct user awareness training for technicians and service desk users to recognize suspicious inputs or behaviors and report anomalies promptly. 5) Monitor application logs and user activities for unusual task name changes or script injection attempts. 6) Employ web application firewalls (WAFs) with rules targeting stored XSS patterns specific to ManageEngine ServiceDesk Plus MSP. 7) Review and tighten role-based access controls to minimize unnecessary privileges for technicians and other users. 8) Regularly audit and test the application for XSS and other injection vulnerabilities as part of the security program. These targeted measures go beyond generic advice by focusing on immediate containment, access control, and layered defenses until the official patch is deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa5182aa0cae24982af
Added to database: 6/2/2025, 3:13:41 PM
Last enriched: 7/3/2025, 5:41:00 PM
Last updated: 8/16/2025, 1:09:49 PM
Views: 19
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.