
PEACH
Un cadre d’isolation des locataires
A stored Cross-Site Scripting (XSS) vulnerability was discovered in ManageEngine Exchange Reporter Plus versions 5722 and below, specifically in the Attachments by File Name Keyword report feature. The vulnerability was assigned CVE-2025-5966 and was fixed in build 5723, released on June 23, 2025 (ManageEngine Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N. This indicates that the vulnerability can be exploited remotely, requires low attack complexity, needs no privileges, but does require user interaction. The vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation) (NVD).
If successfully exploited, this vulnerability could allow attackers to create a privileged account and gain access to the application, potentially compromising the security of the Exchange Reporter Plus installation (ManageEngine Advisory).
ManageEngine has released build 5723 to address this vulnerability. Users are strongly advised to update their Exchange Reporter Plus installation immediately to the latest build. The update can be applied by downloading the latest service pack and following the provided installation instructions (ManageEngine Advisory).
Source: Ce rapport a été généré à l’aide de l’IA
Évaluation gratuite des vulnérabilités
Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.
Obtenez une démo personnalisée
"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."