Description
Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.
Published: 2026-05-21
Score: 8.4 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from a flaw in a third‑party dependency that allows an attacker to execute arbitrary commands inside the agent processes of Zohocorp ManageEngine services. The flaw is classified as a command injection (CWE‑77). Successfully exploited, the attacker can compromise the integrity of the affected systems, gaining full control over the compromised agent machines and potentially enabling lateral movement within the environment.

Affected Systems

The affected products are ManageEngine ADSelfService Plus (all releases prior to 6525), ManageEngine DataSecurity Plus (prior to 6264), and ManageEngine RecoveryManager Plus (prior to 6313). The issue applies to all installations of these products, regardless of geographic location or deployment model.

Risk and Exploitability

The CVSS score of 8.4 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but these factors do not reduce the potential impact. The attack requires authenticated access to the agent, indicating that the attacker must supply valid credentials that are accepted by the agent. The vulnerability can be exercised over the network between the central server and the agent machines, meaning an outsider who gains credentials (perhaps via phishing or weak password policies) can remotely trigger arbitrary code execution on the agent side.

Generated by OpenCVE AI on May 21, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official ManageEngine security update that raises ADSelfService Plus to version 6525 or later, DataSecurity Plus to 6264 or later, and RecoveryManager Plus to 6313 or later, as detailed in the vendor advisory.
  • If a patch is not yet available, isolate all affected agent machines by placing them on a separate network segment and restrict inbound traffic to the agent ports to trusted sources only.
  • Enforce least‑privilege access by limiting the number of users who can authenticate to the agent services, require complex passwords, and enable multi‑factor authentication where possible.

Generated by OpenCVE AI on May 21, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.
Title Remote Code Execution
First Time appeared Zohocorp
Zohocorp manageengine Adselfservice Plus
Zohocorp manageengine Datasecurity Plus
Zohocorp manageengine Recoverymanager Plus
Weaknesses CWE-77
CPEs cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_recoverymanager_plus:*:*:*:*:*:*:*:*
Vendors & Products Zohocorp
Zohocorp manageengine Adselfservice Plus
Zohocorp manageengine Datasecurity Plus
Zohocorp manageengine Recoverymanager Plus
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}


Subscriptions

Zohocorp Manageengine Adselfservice Plus Manageengine Datasecurity Plus Manageengine Recoverymanager Plus
cve-icon MITRE

Status: PUBLISHED

Assigner: Zohocorp

Published:

Updated: 2026-05-21T14:07:57.790Z

Reserved: 2026-02-19T11:49:53.411Z

Link: CVE-2026-2740

cve-icon Vulnrichment

Updated: 2026-05-21T14:07:53.578Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T14:16:44.850

Modified: 2026-05-21T15:26:35.653

Link: CVE-2026-2740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T16:15:14Z

Weaknesses