CVE-2025-5347
📋 TL;DR
This stored cross-site scripting vulnerability in Zohocorp ManageEngine Exchange Reporter Plus allows attackers to inject malicious scripts into reports that execute when viewed by other users. It affects all versions before 5723, potentially compromising user sessions and data. Organizations using vulnerable versions of this Exchange monitoring software are at risk.
💻 Affected Systems
- Zohocorp ManageEngine Exchange Reporter Plus
📦 What is this software?
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to full system compromise.
Likely Case
Attackers with access to the reports module could inject scripts that steal session cookies or credentials from users viewing reports, leading to unauthorized access to the Exchange Reporter Plus system.
If Mitigated
With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing any impact on users.
🎯 Exploit Status
Exploitation requires authenticated access to the reports module to inject malicious scripts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5723
Vendor Advisory: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-5347.html
Restart Required: No
Instructions:
1. Download Exchange Reporter Plus version 5723 or later from the ManageEngine website. 2. Backup your current installation. 3. Run the installer to upgrade to the patched version. 4. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Input Validation and Output Encoding
allImplement server-side input validation and output encoding for all user-supplied data in the reports module.
Content Security Policy
allImplement a strict Content Security Policy header to restrict script execution sources.
🧯 If You Can't Patch
- Restrict access to the reports module to trusted users only
- Implement web application firewall rules to detect and block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check the Exchange Reporter Plus version in the web interface under Help > About or in the installation directory.
Check Version:
Check the version in the web interface or examine the build number in the installation directory.
Verify Fix Applied:
Verify the version is 5723 or later and test report creation/modification with XSS payloads to ensure they are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual report creation/modification patterns
- Requests containing script tags or JavaScript in report parameters
Network Indicators:
- HTTP requests with suspicious script content in POST parameters to reports endpoints
SIEM Query:
source="exchange_reporter_plus" AND (http_request="*<script>*" OR http_request="*javascript:*")