Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7473: CWE-91 XML Injection (aka Blind XPath Injection) in Zohocorp Endpoint Central

0
Medium
VulnerabilityCVE-2025-7473cvecve-2025-7473cwe-91
Published: Tue Oct 21 2025 (10/21/2025, 10:58:47 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: Endpoint Central

Description

Zohocorp ManageEngine EndPoint Central versions 11.4.2516.1 and prior are vulnerable to XML Injection.

AI-Powered Analysis

AILast updated: 10/21/2025, 11:12:40 UTC

Technical Analysis

CVE-2025-7473 is an XML Injection vulnerability classified under CWE-91, specifically a Blind XPath Injection, found in Zohocorp's ManageEngine Endpoint Central product, versions 11.4.2516.1 and prior. Endpoint Central is a widely used IT asset and endpoint management solution that processes XML data for configuration and management tasks. The vulnerability arises from insufficient input validation in XML processing components, allowing an authenticated local attacker with low privileges to inject crafted XML payloads. This injection can manipulate XPath queries or XML parsers, potentially altering the logic of the application or causing denial of service conditions. The attack vector requires local access and authentication but does not require user interaction, increasing the risk in environments where multiple users have access to the management console or underlying systems. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L) reflects that the attack is local with low complexity, requires low privileges, no user interaction, and impacts integrity and availability with a scope change, meaning the vulnerability can affect resources beyond the initially compromised component. No public exploits or patches are currently available, indicating the vulnerability is newly disclosed and may be targeted in the future. The lack of patch availability necessitates immediate defensive measures to mitigate risk. The vulnerability could disrupt endpoint management operations, potentially leading to unauthorized configuration changes or service interruptions, which can cascade into broader operational impacts in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of endpoint management operations. Endpoint Central is often used to manage large fleets of devices, so exploitation could result in unauthorized changes to device configurations or denial of service of management functions, impacting IT operations continuity. Critical sectors such as finance, healthcare, and government, which rely heavily on endpoint management for security compliance and operational stability, could face increased risk of operational disruption. The requirement for local authenticated access limits remote exploitation but does not eliminate risk in environments with multiple administrators or users with local access. The scope change in the CVSS vector suggests that exploitation could affect components beyond the immediate application, potentially impacting other integrated systems or services. Given the medium severity, organizations with high dependency on Endpoint Central should consider this vulnerability a priority for risk management. The absence of known exploits reduces immediate threat but also means attackers may develop exploits in the near future, especially targeting unpatched systems in Europe where Endpoint Central adoption is significant.

Mitigation Recommendations

1. Restrict local access to systems running Endpoint Central to trusted administrators only, minimizing the number of users with local authenticated access. 2. Implement strict access controls and monitoring on the management console and underlying operating systems to detect anomalous XML processing or unexpected configuration changes. 3. Employ application whitelisting and endpoint protection solutions to limit execution of unauthorized scripts or payloads that could exploit XML injection. 4. Regularly audit user privileges and remove unnecessary local accounts or reduce their permissions to the minimum required. 5. Monitor vendor communications closely for security patches or updates addressing this vulnerability and plan immediate deployment once available. 6. Consider network segmentation to isolate Endpoint Central servers from less trusted network zones, reducing the risk of lateral movement. 7. Conduct internal penetration testing focusing on XML injection vectors to identify potential exploitation paths. 8. Educate administrators on the risks of XML injection and encourage vigilance when handling XML-based configurations or logs. These steps go beyond generic advice by focusing on limiting local access, monitoring XML processing, and preparing for patch deployment in a targeted manner.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zohocorp
Date Reserved
2025-07-11T12:34:38.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f76a99a08cdec9505dbb22

Added to database: 10/21/2025, 11:12:25 AM

Last enriched: 10/21/2025, 11:12:40 AM

Last updated: 10/24/2025, 5:27:17 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats