CVE-2025-7430
📋 TL;DR
This stored cross-site scripting (XSS) vulnerability in ManageEngine Exchange Reporter Plus allows attackers to inject malicious scripts into the Folder Message Count and Size report. When users view the compromised report, the script executes in their browser context, potentially stealing session cookies or performing unauthorized actions. Organizations using Exchange Reporter Plus versions 5723 and below are affected.
💻 Affected Systems
- ManageEngine Exchange Reporter Plus
📦 What is this software?
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
Manageengine Exchange Reporter Plus by Zohocorp
View all CVEs affecting Manageengine Exchange Reporter Plus →
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, gain full administrative access to Exchange Reporter Plus, pivot to other systems, and potentially compromise the entire Exchange environment.
Likely Case
Attackers steal user session cookies to gain unauthorized access to Exchange Reporter Plus, modify reports, or access sensitive Exchange data.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing any impact.
🎯 Exploit Status
Exploitation requires the attacker to have access to create or modify reports, but once stored, the XSS executes automatically when users view the report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5724
Vendor Advisory: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-7430.html
Restart Required: Yes
Instructions:
1. Download Exchange Reporter Plus build 5724 or later from ManageEngine website. 2. Stop the Exchange Reporter Plus service. 3. Run the installer/upgrade package. 4. Restart the service.
🔧 Temporary Workarounds
Input Validation Filter
allImplement custom input validation to sanitize all user input in report fields
Content Security Policy
allImplement strict CSP headers to prevent script execution from untrusted sources
🧯 If You Can't Patch
- Restrict report creation/modification permissions to trusted administrators only
- Implement web application firewall (WAF) rules to detect and block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check Exchange Reporter Plus version in web interface under Help > About or via system information page
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Verify version is 5724 or higher and test report creation with XSS payloads to ensure they are properly sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual report creation/modification patterns
- Multiple failed XSS attempts in web server logs
Network Indicators:
- HTTP requests containing script tags or JavaScript in report parameters
SIEM Query:
web_server_logs WHERE (url CONTAINS 'report' AND (params CONTAINS '<script>' OR params CONTAINS 'javascript:'))