Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9223: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Zohocorp ManageEngine Applications Manager

0
High
VulnerabilityCVE-2025-9223cvecve-2025-9223cwe-77
Published: Tue Nov 11 2025 (11/11/2025, 13:13:24 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: ManageEngine Applications Manager

Description

Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:24:17 UTC

Technical Analysis

CVE-2025-9223 is an authenticated command injection vulnerability classified under CWE-77, affecting Zohocorp's ManageEngine Applications Manager versions 178100 and below. The vulnerability stems from improper neutralization of special characters in the 'execute program' action feature, which is designed to run system commands or scripts. Due to insufficient input validation or sanitization, an authenticated user with low privileges can inject arbitrary commands that the underlying operating system executes. This can lead to unauthorized command execution, allowing attackers to compromise system confidentiality, integrity, and availability. The vulnerability requires authentication but no user interaction beyond that, making it easier to exploit in environments where credentials are compromised or insider threats exist. The CVSS v3.1 score of 8.8 indicates a high severity, with network attack vector, low attack complexity, and high impact on all security properties. Although no public exploits have been reported yet, the critical nature of the flaw and ManageEngine's widespread use in enterprise monitoring and management increase the risk of targeted attacks once exploit code becomes available. The vulnerability was reserved in August 2025 and published in November 2025, with no patches currently linked, emphasizing the need for proactive mitigation.

Potential Impact

The impact of CVE-2025-9223 is significant for organizations worldwide using ManageEngine Applications Manager. Successful exploitation allows attackers to execute arbitrary system commands with the privileges of the application, potentially leading to full system compromise. This can result in data breaches, disruption of monitoring services, lateral movement within networks, and deployment of further malware or ransomware. The confidentiality of sensitive monitoring data and credentials can be compromised, integrity of system configurations altered, and availability of critical IT management services disrupted. Enterprises relying on ManageEngine for infrastructure and application monitoring, including financial institutions, healthcare providers, government agencies, and large enterprises, face increased operational risk and potential regulatory consequences. The vulnerability's exploitation could facilitate espionage, sabotage, or financial fraud, especially in sectors where ManageEngine products are integral to IT operations.

Mitigation Recommendations

To mitigate CVE-2025-9223, organizations should immediately restrict access to the 'execute program' action feature within ManageEngine Applications Manager to only highly trusted administrators. Implement strict role-based access controls (RBAC) and enforce the principle of least privilege to minimize the number of users who can authenticate and invoke this feature. Monitor logs for unusual command execution patterns or spikes in activity related to this functionality. Network segmentation and application-layer firewalls can help limit exposure of the management interface to trusted networks only. Until an official patch is released by Zohocorp, consider disabling or restricting the vulnerable feature if feasible. Regularly check for vendor updates and apply security patches promptly once available. Additionally, conduct internal audits to ensure that credentials for ManageEngine are securely stored and rotated frequently to reduce the risk of credential compromise. Employ endpoint detection and response (EDR) tools to detect anomalous command execution indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Zohocorp
Date Reserved
2025-08-20T06:56:25.764Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691346259f8eafcddaf6083f

Added to database: 11/11/2025, 2:20:21 PM

Last enriched: 2/27/2026, 6:24:17 AM

Last updated: 3/25/2026, 2:48:04 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses