Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29794: CWE-285: Improper Authorization in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-29794cvecve-2025-29794cwe-285
Published: Tue Apr 08 2025 (04/08/2025, 17:23:31 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:26:01 UTC

Technical Analysis

CVE-2025-29794 is an improper authorization vulnerability classified under CWE-285 affecting Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. This flaw allows an attacker who already has some level of authorized access (low privileges) to execute arbitrary code remotely over the network without requiring user interaction. The vulnerability arises from insufficient authorization checks within SharePoint's code execution pathways, enabling privilege escalation and remote code execution. The CVSS v3.1 base score is 8.8, reflecting a high-severity issue with network attack vector, low attack complexity, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation could lead to full system compromise, data theft, or disruption of services. Although no public exploits are known yet, the vulnerability is publicly disclosed and should be considered a significant risk. Microsoft has not yet released patches, but organizations should prepare to deploy updates promptly. The vulnerability is particularly critical in environments where SharePoint is exposed to internal or external networks, as it can be exploited by authorized users to escalate privileges and execute malicious code remotely.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Microsoft SharePoint Enterprise Server 2016 in enterprise collaboration and document management. Exploitation could lead to unauthorized access to sensitive corporate data, disruption of business operations, and potential lateral movement within networks. Critical sectors such as finance, government, healthcare, and manufacturing could face data breaches or operational outages. The ability to execute code remotely without user interaction increases the threat level, especially in environments with insufficient network segmentation or weak access controls. The impact extends to regulatory compliance risks under GDPR due to potential data exposure. Organizations relying heavily on SharePoint for internal workflows and document sharing are particularly vulnerable, making this a high-priority issue for European IT security teams.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately upon release to remediate the vulnerability. 2. Restrict SharePoint access to trusted internal networks and implement strict access controls, including network segmentation and firewall rules limiting exposure. 3. Enforce the principle of least privilege for SharePoint users to minimize the risk posed by authorized attackers. 4. Enable and review detailed logging and monitoring on SharePoint servers to detect anomalous activities indicative of exploitation attempts. 5. Conduct regular security assessments and penetration testing focused on SharePoint environments to identify and remediate weaknesses. 6. Consider deploying application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious SharePoint traffic. 7. Educate administrators and users about the risks and signs of exploitation to improve incident response readiness. 8. If possible, isolate SharePoint servers from direct internet exposure and use VPNs or secure gateways for remote access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T18:19:40.247Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc26

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:26:01 AM

Last updated: 3/26/2026, 9:18:33 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses