CVE-2026-3879
Received Received - Intake
Stored XSS in ManageEngine Exchange Reporter Plus Equipment Mailbox

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: ManageEngine

Description
Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Equipment Mailbox Details report.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
zohocorp manageengine_exchange_reporter_plus 5.8
zohocorp manageengine_exchange_reporter_plus 5.8
zohocorp manageengine_exchange_reporter_plus to 5.8 (exc)
zohocorp manageengine_exchange_reporter_plus 5.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3879 is a high-severity stored Cross-Site Scripting (XSS) vulnerability found in Zoho ManageEngine Exchange Reporter Plus, specifically within the Equipment Mailbox Details report in the Reports module.

This vulnerability affects versions up to build 5801 and was fixed in build 5802. It allows an authenticated attacker with Exchange administrative privileges to inject and execute malicious scripts.

When exploited, the attacker can perform actions within Exchange Reporter Plus under the privileges of any user who accesses the compromised report.


How can this vulnerability impact me? :

Exploiting this vulnerability enables an attacker with Exchange administrative privileges to execute malicious scripts within Exchange Reporter Plus.

This can lead to unauthorized actions being performed under the privileges of any user who views the compromised Equipment Mailbox Details report.

Such actions could include data theft, manipulation, or other malicious activities within the Exchange Reporter Plus environment.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a stored Cross-Site Scripting (XSS) issue within the Equipment Mailbox Details report of Exchange Reporter Plus versions before build 5802. Detection involves verifying the version of Exchange Reporter Plus in use and checking for any suspicious script injections in the Equipment Mailbox Details report.

Since the vulnerability requires authenticated access with Exchange administrative privileges, detection commands would focus on identifying the version and inspecting the report data for injected scripts.

  • Check the installed version of Exchange Reporter Plus to confirm if it is before build 5802.
  • Manually review the Equipment Mailbox Details report for any unexpected or suspicious script tags or code.
  • Use web application security scanning tools that support authenticated scans to detect stored XSS vulnerabilities in the report pages.

What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation step is to update Exchange Reporter Plus to build 5802 or later, where the vulnerability has been fixed by implementing proper input validation.

Until the update can be applied, restrict access to the Equipment Mailbox Details report to only trusted administrators to minimize the risk of exploitation.

Ensure that only authenticated users with necessary privileges can access the Exchange Reporter Plus application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a stored Cross-Site Scripting (XSS) issue that allows an authenticated attacker with Exchange administrative privileges to inject and execute malicious scripts within the Exchange Reporter Plus application.

Exploitation of this vulnerability could lead to unauthorized actions performed under the privileges of any user who accesses the compromised report, potentially exposing sensitive data or allowing manipulation of compliance-related reports.

Since Exchange Reporter Plus is used for monitoring, reporting, auditing, and compliance reporting related to Exchange Server, this vulnerability could undermine the integrity and confidentiality of compliance data, thereby impacting adherence to standards such as GDPR and HIPAA.

Therefore, failure to patch this vulnerability may result in non-compliance risks due to potential unauthorized access or tampering with compliance reports and audit data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart