VYPR
Medium severity6.5NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-9227

CVE-2025-9227

Description

Zohocorp ManageEngine OpManager versions 128609 and below are vulnerable to Stored XSS Vulnerability in the SNMP trap processor.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ManageEngine OpManager versions ≤128609 are vulnerable to stored XSS in the SNMP trap processor's description field, allowing remote code execution.

Vulnerability

A stored cross-site scripting (XSS) vulnerability exists in the SNMP trap processor module of Zohocorp ManageEngine OpManager. The root cause is insufficient sanitization of user-supplied input in the description field of SNMP trap configurations. An attacker with permission to modify SNMP trap processors can inject arbitrary JavaScript code into this field, which is then stored and executed when an administrator views the SNMP Trap Processors page [1].

Exploitation

To exploit this vulnerability, an attacker must have a user account with the privilege to modify SNMP trap processor settings. No additional authentication bypass is needed; the vulnerability is triggered via the administrative interface. When the stored malicious script executes in the context of an admin session, the attacker can leverage the admin's CSRF token and session cookie [1].

Impact

Successful exploitation allows the attacker to perform actions on behalf of the administrator, including session hijacking and further attacks. The advisory states that this can lead to a reverse shell and remote code execution on the OpManager server, giving the attacker full control over the affected system [1].

Mitigation

Zohocorp has released fixed versions for all affected product editions: OpManager (build 128610), OpManager Enterprise (build 128598), OpManager Nexus (build 128588), OpManager Nexus Enterprise (build 128543), and OpManager MSP (build 128466). The fix includes output encoding and input sanitization for the description field. Users should upgrade to the corresponding fixed builds listed in the advisory [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.