Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1367: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Zohocorp ManageEngine ADSelfService Plus

0
High
VulnerabilityCVE-2026-1367cvecve-2026-1367cwe-89
Published: Mon Feb 23 2026 (02/23/2026, 06:54:25 UTC)
Source: CVE Database V5
Vendor/Project: Zohocorp
Product: ManageEngine ADSelfService Plus

Description

CVE-2026-1367 is a high-severity authenticated SQL Injection vulnerability in Zohocorp ManageEngine ADSelfService Plus versions 6522 and below, specifically in the search report functionality. An attacker with valid credentials can exploit this flaw to execute arbitrary SQL commands, potentially leading to full compromise of the underlying database. The vulnerability requires low attack complexity and no user interaction, but does require authentication. Successful exploitation can result in disclosure and modification of sensitive data, with limited impact on availability. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or apply mitigations to prevent exploitation. This threat is particularly relevant to enterprises and managed service providers globally that rely on ADSelfService Plus for password self-service and identity management. Countries with significant deployments of ManageEngine products, including the United States, India, United Kingdom, Germany, Australia, Canada, and Japan, are at higher risk. Given the critical nature of the data managed by this product, the vulnerability poses a significant risk to confidentiality and integrity of enterprise credentials and user data.

AI-Powered Analysis

AILast updated: 02/23/2026, 07:46:30 UTC

Technical Analysis

CVE-2026-1367 identifies an authenticated SQL Injection vulnerability in the ManageEngine ADSelfService Plus product by Zohocorp, affecting versions 6522 and earlier. The flaw resides in the search report feature, where user-supplied input is improperly sanitized before being incorporated into SQL queries. This improper neutralization of special elements (CWE-89) allows an authenticated attacker to inject malicious SQL commands. The vulnerability has a CVSS v3.1 base score of 8.3, reflecting high severity due to its potential impact on confidentiality and integrity, combined with low attack complexity and no requirement for user interaction. Exploiting this vulnerability could enable attackers to extract sensitive information such as user credentials, modify or delete data, and potentially escalate privileges within the application or connected systems. Although exploitation requires valid credentials, the broad usage of ADSelfService Plus in enterprise environments makes this a critical concern. No public exploit code or active exploitation has been reported yet, but the risk remains significant due to the nature of the vulnerability and the critical role of the affected software in identity and access management. The lack of available patches at the time of disclosure necessitates immediate attention to mitigation strategies.

Potential Impact

The impact of CVE-2026-1367 is substantial for organizations using ManageEngine ADSelfService Plus. Successful exploitation compromises the confidentiality and integrity of sensitive user and authentication data managed by the platform. Attackers could retrieve password hashes, personal information, or configuration details, facilitating further lateral movement or privilege escalation within the network. Data modification could disrupt authentication workflows or corrupt audit logs, undermining trust and compliance efforts. Although availability impact is low, the breach of identity management systems can lead to significant operational disruption and increased risk of downstream attacks. Enterprises relying on ADSelfService Plus for self-service password resets and identity governance are particularly vulnerable, as attackers may leverage this access to compromise broader IT infrastructure. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability’s characteristics make it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately assess their ManageEngine ADSelfService Plus deployments to identify affected versions (6522 and below). The primary mitigation is to apply vendor-provided patches or updates once available. In the absence of patches, restrict access to the ADSelfService Plus application to trusted networks and enforce strong authentication controls to limit attacker access. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the search report functionality. Conduct thorough input validation and sanitization on all user inputs, especially those used in SQL queries. Monitor logs for unusual query patterns or failed login attempts that may indicate exploitation attempts. Additionally, review and minimize user privileges to reduce the risk posed by compromised credentials. Regularly audit and back up critical data to enable recovery in case of data tampering. Finally, maintain up-to-date threat intelligence feeds to respond promptly if exploit code emerges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zohocorp
Date Reserved
2026-01-23T12:04:24.781Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699c027dbe58cf853b5217e6

Added to database: 2/23/2026, 7:32:13 AM

Last enriched: 2/23/2026, 7:46:30 AM

Last updated: 2/23/2026, 8:52:51 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats