<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Manageengine — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/manageengine/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/manageengine/feed.xml" rel="self" type="application/rss+xml"/><item><title>ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)</title><link>https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</guid><description>An authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.</description><content:encoded><![CDATA[<p>Zohocorp ManageEngine PAM360 and Password Manager Pro are affected by an authenticated SQL injection vulnerability within the query report module. This vulnerability, identified as CVE-2026-5785, impacts PAM360 versions prior to 8531 and Password Manager Pro versions ranging from 8600 to 13230. An attacker with valid, albeit low-privileged, credentials can exploit this flaw by injecting malicious SQL queries through the affected module. Successful exploitation could lead to unauthorized data access, modification, or even complete database compromise. Defenders must apply the necessary patches to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains valid, low-privileged credentials to ManageEngine PAM360 or Password Manager Pro application.</li>
<li>Attacker authenticates to the ManageEngine application with the obtained credentials.</li>
<li>Attacker navigates to the &ldquo;query report&rdquo; module within the application&rsquo;s interface.</li>
<li>Attacker crafts a malicious SQL query containing SQL injection payloads within report generation parameters.</li>
<li>The application processes the crafted SQL query without proper sanitization, executing the injected SQL commands.</li>
<li>The database executes the malicious SQL query, leading to unintended data retrieval (exfiltration) or modification.</li>
<li>Attacker extracts sensitive information like usernames, passwords, or configuration details from the database.</li>
<li>Attacker may further exploit the SQL injection to modify database records, escalate privileges, or compromise other application functionalities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5785 can result in significant data breaches and compromise of sensitive assets managed by ManageEngine PAM360 and Password Manager Pro. An attacker could potentially gain unauthorized access to credentials, configuration settings, and other critical information stored within the database. The impact can range from data theft and service disruption to complete system compromise, potentially affecting hundreds of organizations relying on these products for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ManageEngine PAM360 to version 8531 or later to patch CVE-2026-5785.</li>
<li>Immediately upgrade ManageEngine Password Manager Pro to a version later than 13230, or a version earlier than 8600.</li>
<li>Monitor web server logs for suspicious SQL syntax or unusual database query patterns related to the query report module using the provided Sigma rule.</li>
<li>Implement input validation and sanitization measures within the ManageEngine application to prevent SQL injection attacks.</li>
<li>Enable database auditing to detect and investigate any unauthorized database access or modification attempts stemming from CVE-2026-5785.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5785</category><category>sqli</category><category>manageengine</category><category>pam360</category><category>passwordmanagerpro</category></item><item><title>ManageEngine Exchange Reporter Plus Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-manageengine-xss/</link><pubDate>Fri, 03 Apr 2026 11:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-manageengine-xss/</guid><description>Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in the Distribution Lists report, allowing attackers to inject malicious scripts.</description><content:encoded><![CDATA[<p>Zohocorp ManageEngine Exchange Reporter Plus versions prior to 5802 are susceptible to a Stored Cross-Site Scripting (XSS) vulnerability within the Distribution Lists report. This flaw allows an attacker with low privileges to inject malicious JavaScript code into the report. When other users view the compromised report, the injected script executes, potentially leading to session hijacking, sensitive data theft, or unauthorized administrative actions. The vulnerability stems from insufficient input sanitization when generating the Distribution Lists report, a feature within the Exchange Reporter Plus application designed to provide insights into Exchange environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to ManageEngine Exchange Reporter Plus with low-privilege credentials.</li>
<li>Attacker navigates to the Distribution Lists report generation page.</li>
<li>Attacker crafts a malicious payload containing JavaScript code designed to execute upon rendering. This payload is injected via a field that contributes to the report.</li>
<li>The application stores the malicious payload without proper sanitization within the Distribution Lists report data.</li>
<li>A privileged user views the Distribution Lists report through the web interface.</li>
<li>The stored malicious JavaScript payload is rendered within the user&rsquo;s browser.</li>
<li>The script executes within the context of the user&rsquo;s session, potentially stealing cookies or other sensitive information.</li>
<li>The attacker leverages the stolen credentials or session to perform unauthorized actions within the ManageEngine Exchange Reporter Plus application, such as accessing sensitive reports or modifying configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this Stored XSS vulnerability allows an attacker to compromise user accounts and potentially gain administrative access to the ManageEngine Exchange Reporter Plus application. This can lead to unauthorized access to sensitive Exchange environment data, including email addresses, distribution list memberships, and other configuration details. Given the broad adoption of ManageEngine products, this vulnerability could impact numerous organizations relying on Exchange Reporter Plus for monitoring and reporting. The impact is magnified because the injected script is stored, affecting multiple users who view the compromised report.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ManageEngine Exchange Reporter Plus to version 5802 or later to patch CVE-2026-28754.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious URI Access to Distribution List Reports</code> to identify potential exploitation attempts.</li>
<li>Implement input validation and sanitization on the Distribution Lists report generation page to prevent the injection of malicious scripts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>vulnerability</category><category>manageengine</category></item></channel></rss>