CVE-2022-47966
Zoho ManageEngine ServiceDesk Plus vulnerability analysis and mitigation

Overview

CVE-2022-47966 is a critical remote code execution vulnerability affecting multiple Zoho ManageEngine on-premise products. The vulnerability stems from the use of Apache Santuario xmlsec (XML Security for Java) version 1.4.1, where the XSLT features require the application to implement certain security protections, which the ManageEngine applications failed to provide. The vulnerability was discovered by Khoadha of Viettel Cyber Security and disclosed in January 2023. The vulnerability affects numerous ManageEngine products including ServiceDesk Plus (through version 14003), ADSelfService Plus (before 6211), and many others. Exploitation is only possible if SAML SSO has ever been configured for a product, with some products requiring SAML SSO to be currently active (ManageEngine Advisory).

Technical details

The vulnerability exists due to an improper order of XML signature validation steps in Apache Santuario 1.4.1. The reference validation is performed before signature validation, allowing execution of malicious XSLT transforms. The XSLT is a turing-complete language that, in the ManageEngine environment, can execute arbitrary Java code. The vulnerability can be exploited by sending a malicious SAML response to the service provider's Assertion Consumer URL. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (Horizon3 Analysis).

Impact

Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary code on affected systems with system-level privileges. This can lead to complete system compromise, allowing attackers to gain unauthorized access, establish persistence, and move laterally through the network. The vulnerability has been actively exploited by multiple nation-state APT actors to gain unauthorized access to organizations' networks (CISA Advisory).

Mitigation and workarounds

Organizations should immediately update affected ManageEngine products to their respective fixed versions. For ServiceDesk Plus, update to version 14004 or later; for ADSelfService Plus, update to version 6211 or later; and similarly for other affected products. The vulnerability has been fixed by updating the third-party module Apache Santuario to a recent version. Organizations should also monitor for unauthorized use of remote access software using endpoint detection tools and remove unnecessary accounts and groups from the enterprise (ManageEngine Advisory).

Community reactions

The security community has shown significant concern about this vulnerability due to its critical nature and active exploitation by nation-state actors. CISA has added this vulnerability to their Known Exploited Vulnerabilities (KEV) catalog and issued a joint advisory with the FBI and CNMF detailing the exploitation by multiple nation-state APT actors. Security researchers have published detailed technical analyses and proof-of-concept exploits, highlighting the severity and exploitability of the vulnerability (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Zoho ManageEngine ServiceDesk Plus vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-8309HIGH8.1
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_supportcenter_plus
NoYesAug 20, 2025
CVE-2024-41150MEDIUM6.1
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_servicedesk_plus
NoYesAug 23, 2024
CVE-2024-50053MEDIUM5.4
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_servicedesk_plus
NoYesMar 21, 2025
CVE-2024-38869MEDIUM5.4
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_servicedesk_plus
NoYesAug 23, 2024
CVE-2024-27314LOW2.4
  • Zoho ManageEngine ServiceDesk PlusZoho ManageEngine ServiceDesk Plus
  • cpe:2.3:a:zohocorp:manageengine_servicedesk_plus
NoYesMay 27, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management