CVE-2025-5966
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the 'Attachments by filename keyword' report feature in ManageEngine Exchange Reporter Plus. When users view these reports, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. Organizations using Exchange Reporter Plus versions 5722 and below are affected.
💻 Affected Systems
- Zohocorp ManageEngine Exchange Reporter Plus
📦 What is this software?
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, pivot to internal systems, install backdoors, or exfiltrate sensitive Exchange server data.
Likely Case
Session hijacking leading to unauthorized access to Exchange Reporter Plus, potential data exposure, and limited lateral movement within the application.
If Mitigated
Limited to defacement or nuisance attacks if proper input validation and output encoding are implemented.
🎯 Exploit Status
Exploitation requires authenticated access to create malicious reports, but the attack is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5723 or later
Vendor Advisory: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-5966.html
Restart Required: Yes
Instructions:
1. Download the latest version from ManageEngine's website. 2. Backup your current installation. 3. Run the installer to upgrade. 4. Restart the Exchange Reporter Plus service.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize filename keyword inputs before processing.
Output Encoding
allApply proper HTML encoding to all user-controlled data displayed in reports.
🧯 If You Can't Patch
- Restrict access to the report creation feature to only trusted administrators.
- Implement a web application firewall (WAF) with XSS protection rules.
🔍 How to Verify
Check if Vulnerable:
Check the installed version in Exchange Reporter Plus admin console under Help > About.
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Verify version is 5723 or higher and test report creation with malicious script inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual report creation patterns
- Requests containing script tags in filename parameters
Network Indicators:
- HTTP requests with JavaScript payloads in report-related endpoints
SIEM Query:
source="exchange_reporter_plus" AND (url="*report*" AND (param="*<script>*" OR param="*javascript:*"))