Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3835: CWE-434 Unrestricted Upload of File with Dangerous Type in ManageEngine Exchange Reporter Plus

0
Critical
VulnerabilityCVE-2025-3835cvecve-2025-3835cwe-434
Published: Mon Jun 09 2025 (06/09/2025, 10:29:18 UTC)
Source: CVE Database V5
Vendor/Project: ManageEngine
Product: Exchange Reporter Plus

Description

Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnerable to Remote code execution in the Content Search module.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:59:19 UTC

Technical Analysis

CVE-2025-3835 is a critical remote code execution vulnerability identified in ManageEngine Exchange Reporter Plus, a widely used email analytics and reporting tool. The flaw resides in the Content Search module, where the application fails to properly restrict the types of files that can be uploaded (CWE-434: Unrestricted Upload of File with Dangerous Type). This allows an attacker to upload malicious files that can be executed on the server, leading to full compromise of the system. The vulnerability affects versions 5721 and prior. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H), the attack can be launched remotely over the network without authentication, requiring only user interaction, such as tricking a user into uploading a malicious file. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes complete loss of confidentiality, integrity, and availability of the affected system. Although no exploits have been reported in the wild yet, the high severity and ease of exploitation make this a critical threat. The vulnerability was reserved in April 2025 and published in June 2025, with no patch links currently available, indicating that organizations must be vigilant and prepare to deploy fixes promptly once released.

Potential Impact

The potential impact of CVE-2025-3835 is severe for organizations using ManageEngine Exchange Reporter Plus. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized control over the affected server. This can result in data theft, manipulation of email analytics data, disruption of reporting services, and potentially lateral movement within the network. The compromise of Exchange Reporter Plus could also serve as a foothold for further attacks on enterprise email infrastructure, increasing the risk of widespread data breaches and operational downtime. Given the critical nature of email systems in business communications, this vulnerability poses a significant risk to confidentiality, integrity, and availability of enterprise IT environments globally. Organizations without timely mitigation may face regulatory, financial, and reputational damages.

Mitigation Recommendations

To mitigate CVE-2025-3835, organizations should take immediate and specific actions beyond generic advice: 1) Monitor ManageEngine’s official channels for patches and apply them promptly once available. 2) Implement strict file upload validation controls, including whitelisting allowed file types and scanning uploaded files for malware. 3) Restrict access to the Content Search module to trusted users and networks only, using network segmentation and access control lists. 4) Employ web application firewalls (WAFs) to detect and block suspicious file upload attempts targeting this module. 5) Conduct regular security audits and penetration testing focused on file upload functionalities. 6) Educate users about the risks of uploading untrusted files and enforce policies to minimize risky user interactions. 7) Monitor logs and network traffic for unusual activity related to file uploads or execution attempts within Exchange Reporter Plus. These targeted measures will reduce the attack surface and limit the potential for exploitation until a patch is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zohocorp
Date Reserved
2025-04-21T07:22:57.310Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6846b80d71f4d251b58dd63a

Added to database: 6/9/2025, 10:31:41 AM

Last enriched: 2/27/2026, 1:59:19 AM

Last updated: 3/25/2026, 4:36:22 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses