CVE-2025-24989: CWE-284: Improper Access Control in Microsoft Microsoft Power Pages
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
AI Analysis
Technical Summary
CVE-2025-24989 is an improper access control vulnerability classified under CWE-284 affecting Microsoft Power Pages, a platform used to build business web portals and applications. The flaw allows an attacker to bypass user registration controls remotely without any authentication or user interaction, enabling privilege escalation over the network. This means an attacker can potentially register or manipulate accounts or permissions that should be restricted, thereby gaining unauthorized elevated access to the system. The vulnerability was identified and mitigated by Microsoft before widespread exploitation, with affected customers notified and provided with remediation instructions. The CVSS 3.1 base score of 8.2 indicates a high-severity issue due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is primarily on integrity (I:H), with limited confidentiality (C:L) and no availability (A:N) impact. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no public exploits are known, the potential for privilege escalation and unauthorized access poses a serious risk to organizations relying on Power Pages for critical web services. The mitigation involved patching the registration control bypass and advising customers to audit and clean up any potential exploitation.
Potential Impact
The vulnerability allows attackers to bypass user registration controls and escalate privileges remotely without authentication, potentially enabling unauthorized access to sensitive data or administrative functions within Microsoft Power Pages environments. This can lead to unauthorized modification of web content, configuration changes, or access to restricted resources, severely impacting the integrity of affected systems. While confidentiality impact is limited, the elevated privileges could be leveraged for further attacks or lateral movement within an organization's infrastructure. The lack of availability impact means the service remains operational, but the trustworthiness and security of the platform are compromised. Organizations worldwide using Power Pages for business-critical portals or customer-facing applications face risks of data manipulation, unauthorized access, and reputational damage. The absence of known exploits reduces immediate risk, but the vulnerability's characteristics make it a prime target for attackers if not properly mitigated.
Mitigation Recommendations
Organizations should ensure that all Microsoft Power Pages instances are updated with the latest security patches and mitigations provided by Microsoft. Since the vulnerability involves bypassing user registration controls, administrators must audit their registration workflows and access control configurations to detect any unauthorized accounts or privilege escalations. Implementing strict monitoring and logging of registration and privilege changes can help identify suspicious activities early. Additionally, applying network segmentation and limiting exposure of Power Pages services to trusted networks can reduce attack surface. Employing multi-factor authentication (MFA) for administrative access and reviewing role-based access controls (RBAC) will further minimize risks. Customers should follow Microsoft's cleanup instructions to remediate any potential exploitation and conduct thorough security assessments of their Power Pages deployments. Regular security training for administrators on access control best practices is also recommended.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Brazil, Netherlands, Singapore, South Korea, United Arab Emirates
CVE-2025-24989: CWE-284: Improper Access Control in Microsoft Microsoft Power Pages
Description
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24989 is an improper access control vulnerability classified under CWE-284 affecting Microsoft Power Pages, a platform used to build business web portals and applications. The flaw allows an attacker to bypass user registration controls remotely without any authentication or user interaction, enabling privilege escalation over the network. This means an attacker can potentially register or manipulate accounts or permissions that should be restricted, thereby gaining unauthorized elevated access to the system. The vulnerability was identified and mitigated by Microsoft before widespread exploitation, with affected customers notified and provided with remediation instructions. The CVSS 3.1 base score of 8.2 indicates a high-severity issue due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is primarily on integrity (I:H), with limited confidentiality (C:L) and no availability (A:N) impact. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no public exploits are known, the potential for privilege escalation and unauthorized access poses a serious risk to organizations relying on Power Pages for critical web services. The mitigation involved patching the registration control bypass and advising customers to audit and clean up any potential exploitation.
Potential Impact
The vulnerability allows attackers to bypass user registration controls and escalate privileges remotely without authentication, potentially enabling unauthorized access to sensitive data or administrative functions within Microsoft Power Pages environments. This can lead to unauthorized modification of web content, configuration changes, or access to restricted resources, severely impacting the integrity of affected systems. While confidentiality impact is limited, the elevated privileges could be leveraged for further attacks or lateral movement within an organization's infrastructure. The lack of availability impact means the service remains operational, but the trustworthiness and security of the platform are compromised. Organizations worldwide using Power Pages for business-critical portals or customer-facing applications face risks of data manipulation, unauthorized access, and reputational damage. The absence of known exploits reduces immediate risk, but the vulnerability's characteristics make it a prime target for attackers if not properly mitigated.
Mitigation Recommendations
Organizations should ensure that all Microsoft Power Pages instances are updated with the latest security patches and mitigations provided by Microsoft. Since the vulnerability involves bypassing user registration controls, administrators must audit their registration workflows and access control configurations to detect any unauthorized accounts or privilege escalations. Implementing strict monitoring and logging of registration and privilege changes can help identify suspicious activities early. Additionally, applying network segmentation and limiting exposure of Power Pages services to trusted networks can reduce attack surface. Employing multi-factor authentication (MFA) for administrative access and reviewing role-based access controls (RBAC) will further minimize risks. Customers should follow Microsoft's cleanup instructions to remediate any potential exploitation and conduct thorough security assessments of their Power Pages deployments. Regular security training for administrators on access control best practices is also recommended.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881727ad5a09ad0088bc74
Added to database: 7/29/2025, 12:34:47 AM
Last enriched: 2/27/2026, 12:37:23 PM
Last updated: 3/21/2026, 5:47:54 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.