Cyber Posture

CVE-2025-1723

High

Published: 03 March 2025

Published
03 March 2025
Modified
30 September 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0029 52.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1723 is a high-severity Improper Authentication (CWE-287) vulnerability in Zohocorp Manageengine Adselfservice Plus. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked in the top 47.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and SC-23 (Session Authenticity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly protects session authenticity against mishandling that enables account takeover by low-privilege users.

prevent

Enforces proper session termination to prevent exploitation of mishandled sessions leading to unauthorized account access.

prevent

Requires re-authentication for sensitive actions, mitigating account takeover risks from compromised or mishandled sessions.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Session mishandling in a web app with valid low-priv accounts directly enables web session cookie theft/hijacking (T1539) for account takeover and subsequent use of valid accounts (T1078) for unauthorized access/escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Zohocorp ManageEngine ADSelfService Plus versions 6510 and below are vulnerable to account takeover due to the session mishandling. Valid account holders in the setup only have the potential to exploit this bug.

Deeper analysisAI

CVE-2025-1723 is a vulnerability in Zohocorp ManageEngine ADSelfService Plus versions 6510 and below that enables account takeover due to improper session mishandling. Assigned CWE-287 (Improper Authentication), it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating high severity with network accessibility, low attack complexity, and requirements for low privileges but no user interaction.

The vulnerability can only be exploited by valid account holders already present in the setup, who require low-level privileges (PR:L). Attackers with such access can leverage session mishandling over the network to achieve account takeover, resulting in high impacts to confidentiality and integrity, such as unauthorized access to other accounts, data exfiltration, or privilege escalation within the affected instance.

The vendor has issued an advisory with mitigation guidance at https://www.manageengine.com/products/self-service-password/advisory/CVE-2025-1723.html, which security practitioners should consult for patch availability and recommended remediation steps.

Details

CWE(s)

Affected Products

zohocorp
manageengine adselfservice plus
6.5 · ≤ 6.5

CVEs Like This One

CVE-2025-11250Same product: Zohocorp Manageengine Adselfservice Plus
CVE-2026-27655Same product class: network monitoring / SIEM
CVE-2026-4108Same product class: network monitoring / SIEM
CVE-2026-28703Same product class: network monitoring / SIEM
CVE-2026-4107Same product class: network monitoring / SIEM
CVE-2026-28754Same product class: network monitoring / SIEM
CVE-2026-3879Same product class: network monitoring / SIEM
CVE-2026-28756Same product class: network monitoring / SIEM
CVE-2024-41140Same product class: network monitoring / SIEM
CVE-2025-11669Same product class: network monitoring / SIEM

References