CVE-2025-41407
📋 TL;DR
This SQL injection vulnerability in ManageEngine ADAudit Plus allows attackers to execute arbitrary SQL commands through the OU History report feature. Attackers could potentially access, modify, or delete sensitive Active Directory audit data. Organizations running vulnerable versions of ADAudit Plus are affected.
💻 Affected Systems
- ManageEngine ADAudit Plus
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the ADAudit Plus database, allowing data exfiltration, privilege escalation, and potential lateral movement to connected Active Directory infrastructure.
Likely Case
Unauthorized access to sensitive audit logs and Active Directory information, potentially exposing user credentials, group memberships, and security event data.
If Mitigated
Limited impact with proper network segmentation and database permissions, though sensitive data exposure remains possible.
🎯 Exploit Status
SQL injection typically requires some level of access, but complexity is low once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8511
Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2025-41407.html
Restart Required: Yes
Instructions:
1. Download ADAudit Plus version 8511 or later from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.
🔧 Temporary Workarounds
Disable OU History Report
allTemporarily disable the vulnerable OU History report feature
Network Segmentation
allRestrict access to ADAudit Plus web interface to trusted networks only
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries at application level
- Deploy web application firewall with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check ADAudit Plus version in web interface under Help > About or via command line: java -jar ADAuditPlus.jar -version
Check Version:
java -jar ADAuditPlus.jar -version
Verify Fix Applied:
Verify version is 8511 or higher and test OU History report functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts followed by OU History report access
- Unusual patterns in ADAudit Plus application logs
Network Indicators:
- SQL error messages in HTTP responses
- Unusual database connection patterns from ADAudit Plus server
SIEM Query:
source="ad_audit_logs" AND (event="sql_error" OR event="ou_history_report" AND user="*" AND result="error")