Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24989: CWE-284: Improper Access Control in Microsoft Microsoft Power Pages

0
High
VulnerabilityCVE-2025-24989cvecve-2025-24989cwe-284
Published: Wed Feb 19 2025 (02/19/2025, 22:18:21 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Power Pages

Description

An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:37:23 UTC

Technical Analysis

CVE-2025-24989 is an improper access control vulnerability classified under CWE-284 affecting Microsoft Power Pages, a platform used to build business web portals and applications. The flaw allows an attacker to bypass user registration controls remotely without any authentication or user interaction, enabling privilege escalation over the network. This means an attacker can potentially register or manipulate accounts or permissions that should be restricted, thereby gaining unauthorized elevated access to the system. The vulnerability was identified and mitigated by Microsoft before widespread exploitation, with affected customers notified and provided with remediation instructions. The CVSS 3.1 base score of 8.2 indicates a high-severity issue due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is primarily on integrity (I:H), with limited confidentiality (C:L) and no availability (A:N) impact. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no public exploits are known, the potential for privilege escalation and unauthorized access poses a serious risk to organizations relying on Power Pages for critical web services. The mitigation involved patching the registration control bypass and advising customers to audit and clean up any potential exploitation.

Potential Impact

The vulnerability allows attackers to bypass user registration controls and escalate privileges remotely without authentication, potentially enabling unauthorized access to sensitive data or administrative functions within Microsoft Power Pages environments. This can lead to unauthorized modification of web content, configuration changes, or access to restricted resources, severely impacting the integrity of affected systems. While confidentiality impact is limited, the elevated privileges could be leveraged for further attacks or lateral movement within an organization's infrastructure. The lack of availability impact means the service remains operational, but the trustworthiness and security of the platform are compromised. Organizations worldwide using Power Pages for business-critical portals or customer-facing applications face risks of data manipulation, unauthorized access, and reputational damage. The absence of known exploits reduces immediate risk, but the vulnerability's characteristics make it a prime target for attackers if not properly mitigated.

Mitigation Recommendations

Organizations should ensure that all Microsoft Power Pages instances are updated with the latest security patches and mitigations provided by Microsoft. Since the vulnerability involves bypassing user registration controls, administrators must audit their registration workflows and access control configurations to detect any unauthorized accounts or privilege escalations. Implementing strict monitoring and logging of registration and privilege changes can help identify suspicious activities early. Additionally, applying network segmentation and limiting exposure of Power Pages services to trusted networks can reduce attack surface. Employing multi-factor authentication (MFA) for administrative access and reviewing role-based access controls (RBAC) will further minimize risks. Customers should follow Microsoft's cleanup instructions to remediate any potential exploitation and conduct thorough security assessments of their Power Pages deployments. Regular security training for administrators on access control best practices is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881727ad5a09ad0088bc74

Added to database: 7/29/2025, 12:34:47 AM

Last enriched: 2/27/2026, 12:37:23 PM

Last updated: 3/24/2026, 10:44:46 PM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses