CVE-2025-5966

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the 'Attachments by filename keyword' report feature in ManageEngine Exchange Reporter Plus. When users view these reports, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. Organizations using Exchange Reporter Plus versions 5722 and below are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine Exchange Reporter Plus
Versions: 5722 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable version range are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, pivot to internal systems, install backdoors, or exfiltrate sensitive Exchange server data.

🟠

Likely Case

Session hijacking leading to unauthorized access to Exchange Reporter Plus, potential data exposure, and limited lateral movement within the application.

🟢

If Mitigated

Limited to defacement or nuisance attacks if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to create malicious reports, but the attack is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5723 or later

Vendor Advisory: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-5966.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine's website. 2. Backup your current installation. 3. Run the installer to upgrade. 4. Restart the Exchange Reporter Plus service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize filename keyword inputs before processing.

Output Encoding

all

Apply proper HTML encoding to all user-controlled data displayed in reports.

🧯 If You Can't Patch

  • Restrict access to the report creation feature to only trusted administrators.
  • Implement a web application firewall (WAF) with XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check the installed version in Exchange Reporter Plus admin console under Help > About.

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify version is 5723 or higher and test report creation with malicious script inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report creation patterns
  • Requests containing script tags in filename parameters

Network Indicators:

  • HTTP requests with JavaScript payloads in report-related endpoints

SIEM Query:

source="exchange_reporter_plus" AND (url="*report*" AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export