Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
9.8CRITICAL
EPSS
79.6%
top 0.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 28
Latest updateDec 5

Description

Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
GHSA-59xq-494m-chp8: Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass o2022-04-29
CVEList
CVE-2022-29081: Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass o2022-04-28
VulnCheck
Zoho manageengine_access_manager_plus Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')2022

💥Exploits & PoCs

1
Nuclei
Zoho ManageEngine - Access Control Bypass

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Zoho ManageEngine API Authentication Bypass (CVE-2022-29081)2025-12-05
CVE-2022-29081 (CRITICAL CVSS 9.8) | Zoho ManageEngine Access Manager Pl | cvebase.io