Home Zohocorp CVE-2025-5966
Back to Zohocorp

CVE-2025-5966

ManageEngine Exchange Reporter Plus - Attachments by filename keyword report

Zohocorp CVSS 8.1 Updated April 6, 2026

Executive Risk Summary

"A stored XSS vulnerability exists in ManageEngine Exchange Reporter Plus version 5722 and below, allowing an attacker to inject malicious code via the Attachments by filename keyword report. This could lead to unauthorized access and data breaches."

Anticipated Attack Path

  1. 1. Initial Exploitation: Attacker injects malicious code via the Attachments by filename keyword report
  2. 2. Privilege Escalation: Malicious code executes with elevated privileges
  3. 3. Lateral Movement: Attacker gains unauthorized access to sensitive data

Am I Vulnerable?

  • Verify ManageEngine Exchange Reporter Plus version
  • Check for any suspicious activity in the Attachments by filename keyword report
  • Review application logs for signs of exploitation

Operational Audit Arsenal

Target Type Windows Service
Target Asset ManageEngine.Exchange.Reporter.Plus.exe
Standard Path C:\Program Files\ManageEngine\Exchange Reporter Plus\bin

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only affects the Exchange Reporter Plus application

Internal Work Notes

Stored XSS vulnerability in ManageEngine Exchange Reporter Plus, requiring immediate patching to prevent unauthorized access and data breaches.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.