CVE-2025-41407

8.3 HIGH

📋 TL;DR

This SQL injection vulnerability in ManageEngine ADAudit Plus allows attackers to execute arbitrary SQL commands through the OU History report feature. Attackers could potentially access, modify, or delete sensitive Active Directory audit data. Organizations running vulnerable versions of ADAudit Plus are affected.

💻 Affected Systems

Products:
  • ManageEngine ADAudit Plus
Versions: All versions below 8511
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with OU History report functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ADAudit Plus database, allowing data exfiltration, privilege escalation, and potential lateral movement to connected Active Directory infrastructure.

🟠

Likely Case

Unauthorized access to sensitive audit logs and Active Directory information, potentially exposing user credentials, group memberships, and security event data.

🟢

If Mitigated

Limited impact with proper network segmentation and database permissions, though sensitive data exposure remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection typically requires some level of access, but complexity is low once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8511

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2025-41407.html

Restart Required: Yes

Instructions:

1. Download ADAudit Plus version 8511 or later from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Disable OU History Report

all

Temporarily disable the vulnerable OU History report feature

Network Segmentation

all

Restrict access to ADAudit Plus web interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface under Help > About or via command line: java -jar ADAuditPlus.jar -version

Check Version:

java -jar ADAuditPlus.jar -version

Verify Fix Applied:

Verify version is 8511 or higher and test OU History report functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by OU History report access
  • Unusual patterns in ADAudit Plus application logs

Network Indicators:

  • SQL error messages in HTTP responses
  • Unusual database connection patterns from ADAudit Plus server

SIEM Query:

source="ad_audit_logs" AND (event="sql_error" OR event="ou_history_report" AND user="*" AND result="error")

🔗 References

📤 Share & Export