CVE-2025-5347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
Zohocorp ManageEngine Exchange Reporter Plus versions before 5723 are vulnerable to Stored Cross Site Scripting in the reports module.
AI Analysis
Technical Summary
CVE-2025-5347 is a stored cross-site scripting (XSS) vulnerability identified in Zohocorp's ManageEngine Exchange Reporter Plus, specifically affecting versions before 5723. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. In this case, the reports module fails to adequately sanitize user-supplied input, allowing attackers to inject malicious JavaScript code that is stored persistently on the server. When legitimate users access the affected reports, the malicious script executes in their browsers within the context of the application, potentially enabling actions such as session hijacking, unauthorized actions, or manipulation of report data. The CVSS 3.1 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The impact on confidentiality is low, but the integrity impact is high, as attackers can alter or manipulate report data or perform unauthorized actions on behalf of users. Availability is not impacted. The vulnerability does not require high privileges but does require some level of authenticated access, limiting exploitation to users with at least limited privileges. No public exploits are currently known, but the vulnerability's presence in a widely used IT management tool makes it a significant concern. The lack of a patch link suggests that a fix may be forthcoming or that users should monitor vendor advisories closely.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of email reporting and monitoring data managed through ManageEngine Exchange Reporter Plus. Successful exploitation could allow attackers to inject malicious scripts that manipulate report contents or perform unauthorized actions within the application, potentially leading to misinformation, disruption of email monitoring workflows, or lateral movement within the network. Given that the vulnerability requires low privileges but user interaction, insider threats or compromised user accounts could be leveraged to exploit this flaw. The confidentiality impact is limited, but the integrity compromise could affect decision-making based on corrupted reports. Since the product is used in IT and email infrastructure management, disruption or manipulation could have downstream effects on incident response and compliance reporting. European organizations with regulatory requirements around data integrity and security, such as those under GDPR, may face compliance risks if this vulnerability is exploited. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.
Mitigation Recommendations
Organizations should prioritize updating ManageEngine Exchange Reporter Plus to version 5723 or later once the patch is released by Zohocorp. Until then, implement strict input validation and output encoding on all user-supplied data within the reports module to prevent script injection. Restrict user privileges to the minimum necessary, especially limiting access to report generation and editing features to trusted personnel. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the application. Conduct regular security awareness training to reduce the risk of user interaction with malicious content. Monitor application logs and network traffic for unusual activities indicative of exploitation attempts. Consider isolating the reporting tool within segmented network zones to limit potential lateral movement. Finally, maintain an incident response plan that includes procedures for addressing XSS incidents and potential data integrity issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-5347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Exchange Reporter Plus
Description
Zohocorp ManageEngine Exchange Reporter Plus versions before 5723 are vulnerable to Stored Cross Site Scripting in the reports module.
AI-Powered Analysis
Technical Analysis
CVE-2025-5347 is a stored cross-site scripting (XSS) vulnerability identified in Zohocorp's ManageEngine Exchange Reporter Plus, specifically affecting versions before 5723. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. In this case, the reports module fails to adequately sanitize user-supplied input, allowing attackers to inject malicious JavaScript code that is stored persistently on the server. When legitimate users access the affected reports, the malicious script executes in their browsers within the context of the application, potentially enabling actions such as session hijacking, unauthorized actions, or manipulation of report data. The CVSS 3.1 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The impact on confidentiality is low, but the integrity impact is high, as attackers can alter or manipulate report data or perform unauthorized actions on behalf of users. Availability is not impacted. The vulnerability does not require high privileges but does require some level of authenticated access, limiting exploitation to users with at least limited privileges. No public exploits are currently known, but the vulnerability's presence in a widely used IT management tool makes it a significant concern. The lack of a patch link suggests that a fix may be forthcoming or that users should monitor vendor advisories closely.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of email reporting and monitoring data managed through ManageEngine Exchange Reporter Plus. Successful exploitation could allow attackers to inject malicious scripts that manipulate report contents or perform unauthorized actions within the application, potentially leading to misinformation, disruption of email monitoring workflows, or lateral movement within the network. Given that the vulnerability requires low privileges but user interaction, insider threats or compromised user accounts could be leveraged to exploit this flaw. The confidentiality impact is limited, but the integrity compromise could affect decision-making based on corrupted reports. Since the product is used in IT and email infrastructure management, disruption or manipulation could have downstream effects on incident response and compliance reporting. European organizations with regulatory requirements around data integrity and security, such as those under GDPR, may face compliance risks if this vulnerability is exploited. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.
Mitigation Recommendations
Organizations should prioritize updating ManageEngine Exchange Reporter Plus to version 5723 or later once the patch is released by Zohocorp. Until then, implement strict input validation and output encoding on all user-supplied data within the reports module to prevent script injection. Restrict user privileges to the minimum necessary, especially limiting access to report generation and editing features to trusted personnel. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the application. Conduct regular security awareness training to reduce the risk of user interaction with malicious content. Monitor application logs and network traffic for unusual activities indicative of exploitation attempts. Consider isolating the reporting tool within segmented network zones to limit potential lateral movement. Finally, maintain an incident response plan that includes procedures for addressing XSS incidents and potential data integrity issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zohocorp
- Date Reserved
- 2025-05-30T06:41:04.262Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690378f1aebfcd547472f15a
Added to database: 10/30/2025, 2:40:49 PM
Last enriched: 10/30/2025, 2:56:13 PM
Last updated: 12/14/2025, 6:40:49 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14672: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14674: Injection in aizuda snail-job
MediumCVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.