Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21400: CWE-285: Improper Authorization in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-21400cvecve-2025-21400cwe-285
Published: Tue Feb 11 2025 (02/11/2025, 17:58:39 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Microsoft SharePoint Server Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:49:38 UTC

Technical Analysis

CVE-2025-21400 is a vulnerability identified in Microsoft SharePoint Enterprise Server 2016 (version 16.0.0) characterized by improper authorization (CWE-285). This flaw allows an attacker with low privileges (PR:L) and requiring user interaction (UI:R) to execute remote code on the affected server. The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full system compromise, data leakage, or denial of service. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely without physical access. The scope is unchanged (S:U), so the impact is confined to the vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability’s nature and high CVSS score (8.0) highlight its criticality. The vulnerability was reserved in December 2024 and published in February 2025, indicating recent discovery. SharePoint Enterprise Server 2016 is widely used in enterprise environments for document management and collaboration, making this vulnerability particularly concerning for organizations that have not yet upgraded or patched their systems. The lack of available patches at the time of this report increases the urgency for defensive measures.

Potential Impact

For European organizations, exploitation of CVE-2025-21400 could result in unauthorized remote code execution on SharePoint servers, leading to data breaches involving sensitive corporate or personal information, disruption of collaboration workflows, and potential lateral movement within networks. Given SharePoint’s role in document storage and enterprise content management, attackers could manipulate or exfiltrate critical business data, impacting confidentiality and integrity. Availability could also be compromised, causing operational downtime. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to their reliance on SharePoint for secure document sharing and compliance requirements. The high severity and ease of remote exploitation increase the risk of targeted attacks or opportunistic exploitation, especially if attackers leverage social engineering to meet the user interaction requirement. Failure to address this vulnerability promptly could lead to regulatory penalties under GDPR if personal data is compromised.

Mitigation Recommendations

1. Monitor Microsoft’s official channels closely for the release of security patches addressing CVE-2025-21400 and apply them immediately upon availability. 2. Until patches are available, restrict external access to SharePoint Enterprise Server 2016 instances by implementing network segmentation and firewall rules limiting access to trusted IP addresses. 3. Enforce strict least privilege access controls on SharePoint users to minimize the potential impact of compromised accounts. 4. Implement multi-factor authentication (MFA) for all SharePoint users to reduce the risk of credential abuse. 5. Increase monitoring and logging of SharePoint server activities to detect anomalous behavior indicative of exploitation attempts. 6. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction that could trigger exploitation. 7. Consider upgrading to a more recent, supported version of SharePoint with improved security features if feasible. 8. Conduct regular vulnerability assessments and penetration testing focused on SharePoint environments to identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f03058703ef3fc98599

Added to database: 12/17/2025, 10:30:27 PM

Last enriched: 2/14/2026, 8:49:38 AM

Last updated: 3/25/2026, 2:02:28 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses