Thursday, March 6, 2025
HomeCVE/vulnerabilityZoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access

Published on

SIEM as a Service

Follow Us on Google News

A critical security flaw in Zoho’s widely used identity management solution, ADSelfService Plus, has been patched after researchers discovered it could enable attackers to hijack user sessions and compromise sensitive enrollment data.

Tracked as CVE-2025-1723, the high-severity vulnerability underscores the risks of insufficient session validation in authentication systems, particularly when multi-factor authentication (MFA) safeguards are not enforced.

Vulnerability Overview

The vulnerability, resolved in ADSelfService Plus Build 6511 released on February 26, 2025, stems from improper session handling in builds 6510 and earlier.

Attackers exploiting the flaw could bypass authentication checks to access enrollment data—including password reset configurations and security questions—belonging to other users.

This data could then be weaponized to stage account takeovers, especially in environments where MFA was not enabled for ADSelfService Plus logins.

Zoho’s advisory clarifies that the issue arises when session tokens are not adequately invalidated after authentication events, allowing malicious actors to reuse or manipulate session identifiers.

This oversight creates a window for unauthorized access to administrative and user-level functions, potentially exposing organizations to credential theft and lateral network movement.

Technical Impact and Risks

The exploitation of CVE-2025-1723 poses significant risks to enterprises relying on ADSelfService Plus for self-service password management and single sign-on (SSO) capabilities. By intercepting or guessing valid session IDs, attackers could:

  1. Harvest sensitive user enrollment details stored in the platform.
  2. Modify account recovery settings to lock legitimate users out of their accounts.
  3. Escalate privileges to compromise administrative accounts linked to Active Directory.

Organizations without MFA enforcement for ADSelfService Plus are particularly vulnerable, as the lack of a secondary authentication layer amplifies the exploit’s effectiveness.

cSecurity analysts warn that unpatched systems could face ransomware attacks, data breaches, or insider threat scenarios if adversaries leverage stolen credentials.

Zoho has urged all customers to immediately upgrade to Build 6511, which introduces stricter session validation protocols. The update ensures enrollment data is only accessible to authenticated users tied to active sessions, eliminating cross-user data leakage.

Cybersecurity experts emphasize that patching alone is insufficient without complementary safeguards. Recommendations include:

  • Enabling MFA for all ADSelfService Plus administrator and user accounts.
  • Auditing session timeout configurations to reduce idle windows.
  • Monitoring authentication logs for unusual session activity, such as repeated access attempts from unfamiliar IP addresses.

Zoho’s rapid response—resolving the flaw within 72 hours of internal discovery—has been praised by industry watchers.

However, the incident highlights the importance of proactive vulnerability management, particularly for software integral to enterprise authentication frameworks.

With ADSelfService Plus deployed across over 12,000 enterprises globally, the swift adoption of Build 6511 is imperative to curbing large-scale exploitation.

Security teams must treat this patch as urgent, given the vulnerability’s low exploitation complexity and high potential impact on business continuity.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...