Home Zohocorp CVE-2025-11250
Back to Zohocorp

CVE-2025-11250

ManageEngine ADSelfService Plus - Authentication Module

Zohocorp CVSS 9.1 Updated April 6, 2026

Executive Risk Summary

"Zohocorp ManageEngine ADSelfService Plus versions before 6519 are vulnerable to Authentication Bypass due to improper filter configurations, allowing unauthorized access to sensitive data. This vulnerability can be exploited by an unauthenticated attacker to bypass authentication mechanisms and gain access to the system."

Anticipated Attack Path

  1. 1. Initial Exploitation: Unauthenticated attacker sends a crafted request to bypass authentication
  2. 2. Post-Exploitation: Attacker gains access to the system and potentially sensitive data
  3. 3. Lateral Movement: Attacker moves laterally within the network to exploit other vulnerabilities

Am I Vulnerable?

  • Verify ManageEngine ADSelfService Plus version is 6519 or later
  • Check for any suspicious login activity or unauthorized access
  • Review system logs for potential exploitation attempts

Operational Audit Arsenal

Target Type Windows Service
Target Asset ADSelfServicePlus.exe
Standard Path C:\Program Files\ManageEngine\ADSelfService Plus\bin

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal, but may require brief downtime for patch application

Internal Work Notes

CVE-2025-11250: ManageEngine ADSelfService Plus Authentication Bypass Vulnerability - Apply patch to version 6519 or later to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.