Home Zohocorp CVE-2026-1367
Back to Zohocorp

CVE-2026-1367

ManageEngine ADSelfService Plus - Search Report Option

Zohocorp CVSS 8.3 Updated April 6, 2026

Executive Risk Summary

"ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option, allowing an attacker to potentially extract or modify sensitive data. This vulnerability can be exploited by an authenticated user, highlighting the need for immediate patching and monitoring of the affected systems."

Anticipated Attack Path

  1. 1. Initial Access: Authenticated user gains access to the ManageEngine ADSelfService Plus system
  2. 2. Privilege Escalation: Attacker injects malicious SQL code to elevate privileges
  3. 3. Data Extraction/Modification: Attacker extracts or modifies sensitive data using the injected SQL code

Am I Vulnerable?

  • Verify the version of ManageEngine ADSelfService Plus installed
  • Apply the patch provided by Zohocorp to fix the SQL Injection vulnerability
  • Monitor system logs for suspicious activity related to the search report option

Operational Audit Arsenal

Target Type Windows Service
Target Asset ManageEngine ADSelfService Plus
Standard Path C:\Program Files\ManageEngine\ADSelfService Plus\

Manual Verification Required

This is a non-Windows asset (Zohocorp). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal to Moderate, depending on the system configuration and usage

Internal Work Notes

CVE-2026-1367: ManageEngine ADSelfService Plus SQL Injection Vulnerability - Apply patch and monitor system logs for suspicious activity

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Zohocorp Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.