Home Zohocorp CVE-2025-9223
Back to Zohocorp

CVE-2025-9223

ManageEngine Applications Manager - Execute Program Action Feature

Zohocorp CVSS 8.8 Updated April 6, 2026

Executive Risk Summary

"ManageEngine Applications Manager versions 178100 and below are vulnerable to an authenticated command injection vulnerability. This vulnerability is due to improper configuration in the execute program action feature, allowing an attacker to inject malicious commands."

Anticipated Attack Path

  1. 1. Initial Access: Attacker gains authenticated access to ManageEngine Applications Manager
  2. 2. Command Injection: Attacker injects malicious commands using the execute program action feature
  3. 3. Privilege Escalation: Attacker potentially escalates privileges to gain further access

Am I Vulnerable?

  • Verify ManageEngine Applications Manager version is 178100 or below
  • Check for any suspicious command execution in system logs
  • Review execute program action feature configuration for any signs of tampering

Operational Audit Arsenal

Target Type Java Application
Target Asset ApplicationsManager
Standard Path /usr/local/ManageEngine/ApplicationsManager

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only affects the execute program action feature

Internal Work Notes

CVE-2025-9223: ManageEngine Applications Manager Command Injection Vulnerability - Apply patch to prevent authenticated command injection attacks

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.