List of security vulnerabilities fixed in OpManager

This page contains a list of all security vulnerabilities fixed in OpManager along with its CVE ID and fixed build number. Go to ManageEngine's Security Response Center to report vulnerabilities on ManageEngine products.

 
CVE / ZVE IDSynopsisSeverityFixed in versionLink to latest build
ZVE-2025-7373General : A DOM-based XSS vulnerability was identified in Upgrade Manager Settings due to improper handling of message data in HTML. This issue has now been fixed. (Reported by Daniel Santos)High128665/ 128633 / 128589Download
ZVE-2025-7390OpManager : A Command Injection vulnerability was detected in the Notification Profiles module. This has now been fixed. (Reported by Daniel Santos)High128665 / 128634 / 128589
CVE-2025-9226OpManager: The stored Cross-Site Scripting (XSS) vulnerability allowed authenticated, low-privileged user with permission to modify subnet details to inject malicious JavaScript payloads. This has been fixed. (Reported by tuannq x ngockhanhc311. Refer CVE-2025-9226)Medium128610 / 128598 / 128543 / 128466
CVE-2025-9227OpManager : A Stored Cross-Site Scripting (XSS) vulnerability was identified in the description field of the SNMP Trap Processor module. This issue has now been fixed. (Reported by tuannq x ngockhanhc311. Refer CVE-2025-9227)Medium128610 / 128598 / 128588 / 128543 / 128466
CVE-2025-41437General: A reflected XSS vulnerability was discovered on the Login page. This issue has now been resolved. (Reported by Andrey Alekseev - Positive Technologies).Medium128566 / 128555 / 128542 / 128463
CVE-2024-9871General: A potential privilege escalation vulnerability existed due to incorrect permissions on the product's temporary directory. This allowed for arbitrary file deletion and local privilege escalation. This issue has been resolved by implementing appropriate Access Control Lists on the affected directory. (Reported by Crispr Xiang)Medium128511 / 128461 / 128405
CVE-2024-5466OpManager: A Remote Code Execution (RCE) vulnerability could be exploited by users with 'Write' access to the 'Deploy Agent' action in the UI. This has been fixed now. (Reported by Daniel Santos)High128330 / 128320 / 128188 / 128268
CVE-2024-6748OpManager: The SQL injection vulnerability identified in the URL Monitoring has now been fixed. (Reported by: CrisprXiang, Cokebeer, and LFY)High128318/ 128186/ 128267
CVE-2024-38870OpManager: A stored XSS vulnerability was discovered in Schedule reports. This has now been fixed. (Reported by Muhammed Mekkawy. Refer:CVE-2024-38870)Medium128104/ 128238/ 128250
CVE-2024-36038The stored XSS vulnerabilities was identified with the configured proxy server from 128234 version, have now been fixed. (Reported by Muhammed Mekkawy.)High128249
ZVE-2024-1132Previously, CSRF vulnerability (ZVE-2024-1132) was detected where the external users were able to utilize the network tools without authentication to perform ping or SNMP ping on network devices. This has now been fixed. (Reported by Jayateertha Guruprasad).Medium128103/ 128247
CVE-2023-47211Earlier, path traversal vulnerability was detected for MIB browser. This issue has now been fixed by implementing path sanitization.High127260/ 127248/ 127194/ 127193
CVE-2023-29505Previously, a WebSocket connection was affected by a Cross-site WebSocket hijacking vulnerability. This issue has been fixed by validating the origin of the websocket request.Low127131 / 127120 / 127109
CVE-2023-31099Enterprise Edition: Remote code execution vulnerability was identified during the data transfer in the Enterprise Edition. This has been fixed now.High 126324
ZVE-2023-0284OpManager : The Stored XSS vulnerability issues, that lead to JS injection, and were identified in the URL Monitors, have been fixed now. (Reported by Ranjit Pahan).Medium126279 / 126155 / 126263
CVE-2022-43473OpManager : Previously, there was an XML External Entity (XXE) vulnerability in UCS module. It has been fixed now. (Reported by Cisco Talos-Marcin Noga)Medium126141 / 126154/ 126169
CVE-2022-37024Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv6 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.High 126120 / 126105 / 126003 / 125658
CVE-2022-38772Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv4 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.High 126120 / 126105 / 126003 / 125658
CVE-2022-36923A vulnerability resulted in unauthenticated access of the user API key. This issue has been fixed now. (Reported by Anonymous working with Trend Micro Zero Day Initiative)Critical 126118 / 126104 / 126002 / 125657
CVE-2022-35404Unauthorized creation of files lead to high resource consumption. This has been fixed now.(Reported by Tenable)Medium 125639/ 125655/ 126101
CVE-2022-29535 The SQL injection vulnerability issues identified in few default reports have been fixed now. (Reported by Anh Vu)High 125589/ 125604/ 125629
CVE-2022-27908Earlier, an SQL injection vulnerability was noticed in the Inventory Reports module. It has been fixed now.High125588/ 125603
CVE-2022-24703Earlier, there was a stored XSS vulnerability in the Schedule name field of Schedule page. This issue is fixed now.Medium125584
CVE-2021-43319Remote Code Execution (RCE) vulnerability in the Ping functionality.High125457/ 125473
CVE-2021-41288SQL injection vulnerability noticed in the Reports module.High125437/ 125455 and 125467
CVE-2021-40493SQL injection vulnerability noticed in support diagnostics module.High125437/ 125453
CVE-2021-20078Folder deletion due to path traversal vulnerability in Remote Desktop featureCritical125332/ 125347
CVE-2021-3287Unauthenticated Remote Code Execution (RCE) vulnerability due to general bypass for the deserialization class.Critical125220/ 125314
CVE-2020-28653Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet.High125203/ 125218
CVE-2020-19554A reflected XSS vulnerability when the API key contained an XML-based XSS payloadMedium125177
CVE-2020-13818Directory Traversal validation was being bypassed when using <cachestart>.High125144
CVE-2020-12116Path Traversal vulnerabilityHigh124196/ 125125
CVE-2020-11946Unauthenticated access to API key disclosure from a servlet callHigh124188/ 125120
CVE-2020-11527File read vulnerability in Arbitrary fileHigh124181
CVE-2020-10541Remote Code Execution (RCE) vulnerability in Mail Server Settings v1 APIsHigh124172
CVE-2019-17421Incorrect file permissions on the packaged Nipper executable fileMedium124079 and 124099
CVE-2019-17602SQL injection vulnerabilityHigh124078/ 124089
CVE-2019-15106User login bypass vulnerability in APM pluginHigh124062/ 124070
CVE-2017-11560HTML Injection vulnerabilityMedium124033
InternalAn operator user could access some restricted folders by bypassing the session.High123241
CVE-2018-20339XSS vulnerability in 'Alarms' and 'Notes'.High123239
CVE-2018-20338SQL Injection vulnerability in 'Alarms'.High123239
CVE-2018-20173SQL Injection vulnerability in performance monitors' graph.High123238
CVE-2018-19921XSS vulnerability in adding/updating domain controller.High123237
CVE-2018-19403Unauthenticated Remote Code Execution (RCE) vulnerability.High123231
CVE-2018-19288XSS vulnerability in updating 'Widgets API'.High123223
CVE-2018-18949SQL Injection vulnerability in 'Mail Server' settings.High123222
CVE-2018-18980XML external entity vulnerability in 'Business view' page.High123214
CVE-2018-18475Unrestricted file upload vulnerability in uploading a background image in 'Business view'.High123214
CVE-2018-18262XSS vulnerability in 'Add Custom Category'.High123214
CVE-2018-12997, CVE-2018-12998Injecting arbitrary web script or HTML via the parameter 'operation'.High123169
CVE-2018-9088, CVE-2018-9087, CVE-2018-9089SQL Injection vulnerability in 'FailOverHelperServlet'.High123157
CVE-2018-10803XSS vulnerability (Cross-site-scripting) in 'Add credentials' page.High123122
CVE-2017-12617Uploading JSP file to server via 'HTTP PUT' methodHigh123046