CVE-2025-9435

5.5 MEDIUM

📋 TL;DR

A path traversal vulnerability in Zohocorp ManageEngine ADManager Plus allows attackers to access files outside the intended directory through the User Management module. This affects all versions below 7230, potentially exposing sensitive system files to authenticated users.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine ADManager Plus
Versions: All versions below 7230
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the User Management module and requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could read sensitive system files, configuration files, or potentially write files to unauthorized locations, leading to system compromise or data exfiltration.

🟠

Likely Case

Authenticated users could access files they shouldn't have permission to view, potentially exposing configuration files, logs, or other sensitive data within the application's directory structure.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to the application's own files and directories, preventing system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the ADManager Plus application. The path traversal occurs through the User Management module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7230

Vendor Advisory: https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2025-9435.html

Restart Required: Yes

Instructions:

1. Download ADManager Plus build 7230 or later from the ManageEngine website. 2. Stop the ADManager Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Restrict User Management Module Access

all

Limit access to the User Management module to only necessary administrative users.

Implement Web Application Firewall Rules

all

Configure WAF rules to block path traversal patterns in requests to the User Management module.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ADManager Plus from sensitive systems
  • Enable detailed logging and monitoring of file access attempts in the User Management module

🔍 How to Verify

Check if Vulnerable:

Check the ADManager Plus version in the web interface under Help > About or examine the installation directory for version files.

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADManager Plus\conf\version.info' or web interface. On Linux: Check '/opt/ManageEngine/ADManager Plus/conf/version.info' or web interface.

Verify Fix Applied:

Verify the version is 7230 or higher and test that path traversal attempts in the User Management module are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in ADManager Plus logs
  • Multiple failed attempts to access files with '../' sequences in User Management module

Network Indicators:

  • HTTP requests containing '../' or directory traversal sequences to User Management endpoints

SIEM Query:

source="admanager_plus" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export