CVE-2026-1367
Published: 23 February 2026
Description
Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely identification, reporting, and patching of the SQL injection flaw in ManageEngine ADSelfService Plus versions 6522 and below.
Enforces information input validation mechanisms at the vulnerable search report option to block malicious SQL payloads from exploitation.
Vulnerability scanning detects the SQL injection vulnerability in affected ADSelfService Plus versions, enabling remediation before exploitation.
Security SummaryAI
CVE-2026-1367 is an authenticated SQL injection vulnerability (CWE-89) in the search report option of Zohocorp ManageEngine ADSelfService Plus versions 6522 and below. Published on 2026-02-23, it carries a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality and integrity.
Low-privileged authenticated users can exploit this vulnerability remotely over the network without requiring user interaction. Exploitation enables high confidentiality and integrity impacts, potentially allowing attackers to extract sensitive data or modify database contents through SQL injection, alongside a low availability impact.
The vendor advisory at https://www.manageengine.com/uk/products/self-service-password/advisory/CVE-2026-1367.html provides details on mitigation and patching recommendations.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated SQL injection in a web application enables exploitation of a public-facing application (T1190) and unauthorized extraction of data from the underlying database (T1213.006).