<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5785 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5785/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5785/feed.xml" rel="self" type="application/rss+xml"/><item><title>ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)</title><link>https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</guid><description>An authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.</description><content:encoded><![CDATA[<p>Zohocorp ManageEngine PAM360 and Password Manager Pro are affected by an authenticated SQL injection vulnerability within the query report module. This vulnerability, identified as CVE-2026-5785, impacts PAM360 versions prior to 8531 and Password Manager Pro versions ranging from 8600 to 13230. An attacker with valid, albeit low-privileged, credentials can exploit this flaw by injecting malicious SQL queries through the affected module. Successful exploitation could lead to unauthorized data access, modification, or even complete database compromise. Defenders must apply the necessary patches to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains valid, low-privileged credentials to ManageEngine PAM360 or Password Manager Pro application.</li>
<li>Attacker authenticates to the ManageEngine application with the obtained credentials.</li>
<li>Attacker navigates to the &ldquo;query report&rdquo; module within the application&rsquo;s interface.</li>
<li>Attacker crafts a malicious SQL query containing SQL injection payloads within report generation parameters.</li>
<li>The application processes the crafted SQL query without proper sanitization, executing the injected SQL commands.</li>
<li>The database executes the malicious SQL query, leading to unintended data retrieval (exfiltration) or modification.</li>
<li>Attacker extracts sensitive information like usernames, passwords, or configuration details from the database.</li>
<li>Attacker may further exploit the SQL injection to modify database records, escalate privileges, or compromise other application functionalities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5785 can result in significant data breaches and compromise of sensitive assets managed by ManageEngine PAM360 and Password Manager Pro. An attacker could potentially gain unauthorized access to credentials, configuration settings, and other critical information stored within the database. The impact can range from data theft and service disruption to complete system compromise, potentially affecting hundreds of organizations relying on these products for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ManageEngine PAM360 to version 8531 or later to patch CVE-2026-5785.</li>
<li>Immediately upgrade ManageEngine Password Manager Pro to a version later than 13230, or a version earlier than 8600.</li>
<li>Monitor web server logs for suspicious SQL syntax or unusual database query patterns related to the query report module using the provided Sigma rule.</li>
<li>Implement input validation and sanitization measures within the ManageEngine application to prevent SQL injection attacks.</li>
<li>Enable database auditing to detect and investigate any unauthorized database access or modification attempts stemming from CVE-2026-5785.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5785</category><category>sqli</category><category>manageengine</category><category>pam360</category><category>passwordmanagerpro</category></item></channel></rss>