CVE-2025-24989: CWE-284: Improper Access Control in Microsoft Microsoft Power Pages
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
AI Analysis
Technical Summary
CVE-2025-24989 is an improper access control vulnerability classified under CWE-284 affecting Microsoft Power Pages, a low-code development platform for building business websites and portals. The flaw allows an attacker to bypass user registration controls remotely over the network without requiring authentication or user interaction, enabling privilege escalation. Specifically, the vulnerability permits unauthorized actors to elevate their privileges within the Power Pages environment, potentially gaining administrative capabilities or unauthorized access to restricted resources. The CVSS v3.1 score of 8.2 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact primarily affects integrity (I:H) with limited confidentiality loss (C:L) and no availability impact (A:N). Microsoft has addressed this vulnerability by updating the service to block the registration control bypass and has notified all affected customers with guidance on reviewing their sites for exploitation and performing cleanup. No public exploits have been reported, and the vulnerability was reserved and published in early 2025. The lack of affected version specifics suggests the issue was service-wide or in a cloud-hosted environment rather than discrete software versions. This vulnerability highlights the risks of improper access control in web-facing low-code platforms that integrate with enterprise and customer data.
Potential Impact
For European organizations, the vulnerability poses a significant risk to the integrity of their web portals and business applications built on Microsoft Power Pages. Unauthorized privilege escalation could allow attackers to modify site content, alter business logic, or access sensitive data indirectly, undermining trust and compliance with data protection regulations such as GDPR. The network-based exploitation without authentication increases the attack surface, especially for organizations exposing Power Pages portals to the internet. Potential impacts include unauthorized data manipulation, disruption of business processes, and reputational damage. Given the widespread adoption of Microsoft cloud services in Europe, especially in public sector digital transformation projects and private enterprises, the vulnerability could affect critical infrastructure and services. Although no known exploits exist yet, the high severity and ease of exploitation necessitate prompt action to prevent potential breaches and ensure regulatory compliance.
Mitigation Recommendations
European organizations should immediately verify that their Microsoft Power Pages environments have received the service update that mitigates this vulnerability. They should follow Microsoft’s guidance to review site registration controls and audit logs for any signs of unauthorized access or privilege escalation attempts. Implementing strict monitoring and alerting on privilege changes within Power Pages is critical. Organizations should also conduct thorough cleanup of any potentially compromised accounts or configurations as per Microsoft’s instructions. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block anomalous registration or privilege escalation attempts. Additionally, organizations should enforce strong identity and access management (IAM) policies, including multi-factor authentication (MFA) for administrative access to Power Pages portals. Regular security assessments and penetration testing focused on low-code platforms can help identify residual risks. Finally, maintaining up-to-date incident response plans that include cloud service vulnerabilities will improve readiness against exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-24989: CWE-284: Improper Access Control in Microsoft Microsoft Power Pages
Description
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
AI-Powered Analysis
Technical Analysis
CVE-2025-24989 is an improper access control vulnerability classified under CWE-284 affecting Microsoft Power Pages, a low-code development platform for building business websites and portals. The flaw allows an attacker to bypass user registration controls remotely over the network without requiring authentication or user interaction, enabling privilege escalation. Specifically, the vulnerability permits unauthorized actors to elevate their privileges within the Power Pages environment, potentially gaining administrative capabilities or unauthorized access to restricted resources. The CVSS v3.1 score of 8.2 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact primarily affects integrity (I:H) with limited confidentiality loss (C:L) and no availability impact (A:N). Microsoft has addressed this vulnerability by updating the service to block the registration control bypass and has notified all affected customers with guidance on reviewing their sites for exploitation and performing cleanup. No public exploits have been reported, and the vulnerability was reserved and published in early 2025. The lack of affected version specifics suggests the issue was service-wide or in a cloud-hosted environment rather than discrete software versions. This vulnerability highlights the risks of improper access control in web-facing low-code platforms that integrate with enterprise and customer data.
Potential Impact
For European organizations, the vulnerability poses a significant risk to the integrity of their web portals and business applications built on Microsoft Power Pages. Unauthorized privilege escalation could allow attackers to modify site content, alter business logic, or access sensitive data indirectly, undermining trust and compliance with data protection regulations such as GDPR. The network-based exploitation without authentication increases the attack surface, especially for organizations exposing Power Pages portals to the internet. Potential impacts include unauthorized data manipulation, disruption of business processes, and reputational damage. Given the widespread adoption of Microsoft cloud services in Europe, especially in public sector digital transformation projects and private enterprises, the vulnerability could affect critical infrastructure and services. Although no known exploits exist yet, the high severity and ease of exploitation necessitate prompt action to prevent potential breaches and ensure regulatory compliance.
Mitigation Recommendations
European organizations should immediately verify that their Microsoft Power Pages environments have received the service update that mitigates this vulnerability. They should follow Microsoft’s guidance to review site registration controls and audit logs for any signs of unauthorized access or privilege escalation attempts. Implementing strict monitoring and alerting on privilege changes within Power Pages is critical. Organizations should also conduct thorough cleanup of any potentially compromised accounts or configurations as per Microsoft’s instructions. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block anomalous registration or privilege escalation attempts. Additionally, organizations should enforce strong identity and access management (IAM) policies, including multi-factor authentication (MFA) for administrative access to Power Pages portals. Regular security assessments and penetration testing focused on low-code platforms can help identify residual risks. Finally, maintaining up-to-date incident response plans that include cloud service vulnerabilities will improve readiness against exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881727ad5a09ad0088bc74
Added to database: 7/29/2025, 12:34:47 AM
Last enriched: 12/17/2025, 11:58:32 PM
Last updated: 2/7/2026, 12:58:30 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.