CVE-2026-28756
Stored XSS in ManageEngine Exchange Reporter Plus Permissions Report
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: ManageEngine
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zohocorp | manageengine_exchange_reporter_plus | 5.8 |
| zohocorp | manageengine_exchange_reporter_plus | 5.8 |
| zohocorp | manageengine_exchange_reporter_plus | to 5.8 (exc) |
| zohocorp | manageengine_exchange_reporter_plus | 5.8 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-28756 is a stored Cross-Site Scripting (XSS) vulnerability found in Zoho ManageEngine Exchange Reporter Plus, specifically in the "Permissions based on Distribution Groups" report.
This vulnerability affects versions before build 5802 and allows an authenticated attacker with Exchange administrative privileges to inject and execute malicious scripts within the application.
When a user views the compromised report, the malicious script runs with their privileges, potentially enabling unauthorized actions within the Exchange environment.
The issue was fixed in build 5802 by adding proper input validation to prevent script injection.
How can this vulnerability impact me? :
Exploitation of this vulnerability can allow an attacker with Exchange administrative privileges to execute malicious scripts within Exchange Reporter Plus.
This can lead to unauthorized operations being performed under the identity of any user who views the compromised report, potentially compromising the security and integrity of the Exchange environment.
Such unauthorized actions could include accessing sensitive information, modifying permissions, or disrupting Exchange services.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability is a stored Cross-Site Scripting (XSS) issue in the "Permissions based on Distribution Groups" report of Exchange Reporter Plus versions 5801 and earlier. Detection involves identifying if your Exchange Reporter Plus installation is running a vulnerable build.
Since the vulnerability requires an authenticated attacker with Exchange administrative privileges to inject malicious scripts into the report, detection on the network or system would primarily involve verifying the version of Exchange Reporter Plus in use.
No specific commands for detecting the vulnerability or malicious activity are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should update their Exchange Reporter Plus installations to version 5802 or later, where the issue has been fixed by implementing proper input validation to prevent script injection.
If updating immediately is not possible, users should restrict Exchange administrative privileges to trusted personnel only, as exploitation requires authenticated admin access.
For assistance with updating or further inquiries, users should contact the product support or security team.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an authenticated attacker with Exchange administrative privileges to execute malicious scripts within Exchange Reporter Plus, potentially performing unauthorized operations under the privileges of any user who views the compromised report.
Such unauthorized access and actions could lead to breaches of confidentiality and integrity of sensitive data, which may impact compliance with standards and regulations like GDPR and HIPAA that require protection of personal and health information.
However, the provided information does not explicitly detail the direct compliance implications or specific regulatory impacts of this vulnerability.