Support
 
Phone Live Chat
 
Support
 
US: +1 888 720 9500
US: +1 800 443 6694
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9393

 
 
 
 
 
Security Updates

[Fixed] Path Traversal Vulnerability in /Report.do allowing arbitrary file read (ZVE-2026-1924) - ManageEngine ADManager Plus

Vulnerability Details
Severity High
ZVE ID ZVE-2026-1924
Affected software versions Build 8041 and older
Fixed version Build 8042
Fixed on April 22, 2026

Details

ZVE-2026-1924 describes a Path Traversal vulnerability in the /Report.do endpoint of ADManager Plus. The issue occurred due to improper validation of the path parameter, which allowed authenticated users to manipulate input and read arbitrary files from the server file system. By exploiting this, attackers could access sensitive system files outside the intended directory.

Impact

This vulnerability could be exploited only by authenticated users and allowed unauthorized access to sensitive files on the server. This could lead to exposure of configuration data and potentially aid further compromise of the system.

Fix

This issue has been resolved in ADManager Plus build 8042 by implementing proper validation and restriction of file path inputs.

Steps to update

Update your ADManager Plus instance to the latest build by installing the service pack.

Acknowledgement

This issue was reported by khanh nguyen through Zoho's Bug Bounty program.

 

Select a language to translate the contents of this web page:

Need further assistance?

Fill this form, and we'll contact you rightaway.

Request Support

  •  
  • *
     
  • *
     
  • *
     
  • By submitting you agree to processing of personal data according to the Privacy Policy.

"Thank you for submitting your request.

Our technical support team will get in touch with you at the earliest."

ADManager Plus Trusted By

The one-stop solution to Active Directory Management and Reporting
Email Download Link Email the ADManager Plus download link