Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9435: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Zohocorp ManageEngine ADManager Plus

0
Medium
VulnerabilityCVE-2025-9435cvecve-2025-9435cwe-22
Published: Tue Jan 13 2026 (01/13/2026, 13:14:03 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: ManageEngine ADManager Plus

Description

Zohocorp ManageEngine ADManager Plus versions below 7230 are vulnerable to Path Traversal in the User Management module

AI-Powered Analysis

AILast updated: 01/13/2026, 13:55:53 UTC

Technical Analysis

CVE-2025-9435 is a path traversal vulnerability classified under CWE-22 found in Zohocorp's ManageEngine ADManager Plus product, specifically impacting versions below 7230. The vulnerability resides in the User Management module, where improper limitation of pathname input allows an authenticated user with limited privileges to traverse directories beyond the intended restricted scope. This can enable unauthorized access to files or directories outside the designated areas, potentially leading to information disclosure, unauthorized modification, or disruption of service. The vulnerability requires network access (AV:N), low attack complexity (AC:L), but does require privileges (PR:L) and user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is low to moderate (C:L/I:L/A:L), resulting in a CVSS 3.1 base score of 5.5, categorized as medium severity. No public exploits have been reported yet, but the nature of the vulnerability in a critical Active Directory management tool means exploitation could have serious consequences. The lack of a patch link suggests that a fix may be forthcoming or that users must upgrade to version 7230 or later to remediate. The vulnerability highlights the importance of input validation and secure file handling in enterprise management software.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of Active Directory management operations. Successful exploitation could allow an attacker with limited privileges to access sensitive configuration files or data outside the intended directory, potentially leading to unauthorized disclosure of sensitive information or modification of critical files. This could disrupt directory services, impact user management workflows, or facilitate further lateral movement within the network. Given that ADManager Plus is widely used in enterprise environments for managing Active Directory and user accounts, the impact could extend to compliance violations, operational disruptions, and increased risk of insider threats or external attacks leveraging compromised AD infrastructure. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate the risk, especially from malicious insiders or targeted attacks. Organizations in Europe with complex AD environments and regulatory requirements around data protection should consider this vulnerability a significant operational risk.

Mitigation Recommendations

1. Upgrade ManageEngine ADManager Plus to version 7230 or later as soon as the patch is available to eliminate the vulnerability. 2. Until patching is possible, restrict access to the User Management module to only trusted and necessary personnel to reduce the attack surface. 3. Implement strict role-based access controls (RBAC) and monitor privilege assignments to ensure no unnecessary privileges are granted. 4. Enable detailed logging and monitoring of file access and directory traversal attempts within the ADManager Plus environment to detect suspicious activity early. 5. Conduct regular security audits and vulnerability assessments on AD management tools and related infrastructure. 6. Educate users about the risks of interacting with potentially malicious inputs or links that could trigger exploitation. 7. Network segmentation and limiting exposure of ADManager Plus interfaces to trusted networks can reduce external attack vectors. 8. Review and harden input validation mechanisms if custom integrations or scripts interact with ADManager Plus to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zohocorp
Date Reserved
2025-08-25T12:33:30.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69664b8ba60475309f2116b0

Added to database: 1/13/2026, 1:41:31 PM

Last enriched: 1/13/2026, 1:55:53 PM

Last updated: 1/14/2026, 6:21:02 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats