CVE-2026-4108
Received Received - Intake
Stored XSS in ManageEngine Exchange Reporter Plus Non-Owner Mailbox

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: ManageEngine

Description
Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Non-Owner Mailbox Permission report.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
zohocorp manageengine_exchange_reporter_plus 5.8
zohocorp manageengine_exchange_reporter_plus 5.8
zohocorp manageengine_exchange_reporter_plus to 5.8 (exc)
zohocorp manageengine_exchange_reporter_plus 5.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-4108 is a high-severity stored Cross-Site Scripting (XSS) vulnerability found in Zoho ManageEngine Exchange Reporter Plus, specifically in the Non-Owner Mailbox Permission report within the Reports module.

This vulnerability affects versions up to build 5801 and was fixed in build 5802. It allows an authenticated attacker with Exchange administrative privileges to inject and execute malicious scripts in the affected report.

When exploited, the attacker can perform actions within Exchange Reporter Plus under the privileges of any user who views the compromised report.

The issue was resolved by implementing proper input validation in version 5802.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with Exchange administrative privileges to execute malicious scripts within Exchange Reporter Plus reports.

As a result, the attacker can perform unauthorized actions under the identity of any user who views the compromised Non-Owner Mailbox Permission report.

This could lead to unauthorized access, data manipulation, or other malicious activities within the Exchange Reporter Plus environment.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a stored Cross-Site Scripting (XSS) issue in the Non-Owner Mailbox Permission report of Exchange Reporter Plus versions before build 5802. Detection involves identifying if your Exchange Reporter Plus instance is running a vulnerable version (up to build 5801) and checking if the Non-Owner Mailbox Permission report contains any suspicious or injected scripts.

Since this is an application-level vulnerability affecting a specific report, network-level detection commands are not directly applicable. Instead, detection should focus on verifying the software version and inspecting the report data for malicious script content.

  • Check the installed version of Exchange Reporter Plus to confirm if it is before build 5802.
  • Review the Non-Owner Mailbox Permission report for any unexpected or suspicious script tags or payloads.
  • No specific command-line tools or network commands are provided in the available resources for direct detection.

What immediate steps should I take to mitigate this vulnerability?

The primary and immediate mitigation step is to update Exchange Reporter Plus to build 5802 or later, as this version includes the fix that implements proper input validation to prevent the stored XSS vulnerability.

Until the update can be applied, restrict access to the Non-Owner Mailbox Permission report to trusted users only, especially limiting Exchange administrative privileges to reduce the risk of exploitation.

Monitor and audit user activities within Exchange Reporter Plus to detect any unusual behavior that might indicate exploitation attempts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-4108 is a stored Cross-Site Scripting (XSS) vulnerability in ManageEngine Exchange Reporter Plus that allows an authenticated attacker with Exchange administrative privileges to execute malicious scripts within the application. This can lead to unauthorized actions performed under the privileges of any user who views the compromised report.

Since Exchange Reporter Plus is used for monitoring, reporting, auditing, and compliance reporting related to Exchange Server environments, exploitation of this vulnerability could undermine the integrity and confidentiality of compliance data. This may impact an organization's ability to maintain compliance with standards and regulations such as GDPR and HIPAA, which require protection of sensitive data and prevention of unauthorized access or actions.

Therefore, failure to patch this vulnerability could result in non-compliance risks due to potential data exposure or manipulation within compliance reports.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart