CVE-2025-7633

7.3 HIGH

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in ManageEngine Exchange Reporter Plus allows attackers to inject malicious scripts into custom reports. When users view these reports, the scripts execute in their browser context, potentially stealing session cookies or performing actions as the user. Organizations using Exchange Reporter Plus versions 5723 and below are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine Exchange Reporter Plus
Versions: 5723 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with custom report functionality are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, install backdoors, or pivot to other systems in the network.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions performed in the context of logged-in users.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though some risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to create/modify custom reports. Exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5724 or later

Vendor Advisory: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-7633.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the Exchange Reporter Plus service.

🔧 Temporary Workarounds

Disable Custom Reports

all

Temporarily disable custom report creation/modification functionality.

Navigate to Admin > Security Settings > Disable Custom Reports

Implement WAF Rules

all

Add XSS filtering rules to web application firewall.

Add rule: block requests containing <script> tags in report parameters

🧯 If You Can't Patch

  • Restrict access to custom report functionality to trusted administrators only
  • Implement Content Security Policy headers to mitigate script execution

🔍 How to Verify

Check if Vulnerable:

Check current version in Admin > About. If version is 5723 or below, system is vulnerable.

Check Version:

Check version in web interface or installation directory

Verify Fix Applied:

Verify version is 5724 or later and test custom report functionality with XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual custom report creation/modification
  • Requests containing script tags in report parameters

Network Indicators:

  • HTTP requests with JavaScript payloads in report fields

SIEM Query:

source="exchange_reporter" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export