Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29807: CWE-502: Deserialization of Untrusted Data in Microsoft Microsoft Dataverse

0
High
VulnerabilityCVE-2025-29807cvecve-2025-29807cwe-502cwe-94
Published: Fri Mar 21 2025 (03/21/2025, 00:29:57 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dataverse

Description

Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:00:52 UTC

Technical Analysis

CVE-2025-29807 is a deserialization vulnerability classified under CWE-502 affecting Microsoft Dataverse, a cloud-based data platform widely used for business applications. The flaw arises from improper handling of untrusted serialized data, allowing an attacker with authorized access to send crafted serialized objects over the network. Upon deserialization, these objects can trigger arbitrary code execution within the context of the Dataverse service. The vulnerability requires an attacker to have low privileges (PR:L) and user interaction (UI:R), such as convincing a user to perform an action that processes malicious data. The attack vector is network-based (AV:N), and the scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially compromised component. The CVSS 3.1 base score is 8.7 (high), reflecting high confidentiality and integrity impacts without affecting availability. Although no public exploits are reported yet, the vulnerability poses a serious risk due to the potential for remote code execution and the critical role of Dataverse in enterprise environments. The lack of currently available patches underscores the need for immediate mitigation strategies.

Potential Impact

Successful exploitation of CVE-2025-29807 can lead to full compromise of sensitive data stored within Microsoft Dataverse, including unauthorized data disclosure and modification. Attackers could execute arbitrary code remotely, potentially gaining persistent access or moving laterally within an organization's infrastructure. This threatens the confidentiality and integrity of business-critical data and applications relying on Dataverse. Given Dataverse's integration with Microsoft Power Platform and Dynamics 365, the impact extends to numerous enterprise workflows and customer data management systems. While availability impact is low, the breach of trust and data integrity can cause significant operational disruption, regulatory compliance violations, and reputational damage globally.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation to limit access to Microsoft Dataverse services only to trusted users and systems. Employ multi-factor authentication to reduce the risk of unauthorized access by attackers with low privileges. Monitor and audit user activities for suspicious behavior indicative of exploitation attempts. Apply input validation and sanitization on any data entering Dataverse workflows to prevent malicious serialized objects from being processed. Disable or restrict features that automatically deserialize data from untrusted sources where feasible. Maintain up-to-date backups of critical data to enable recovery in case of compromise. Once Microsoft releases a patch, prioritize immediate deployment in all affected environments. Additionally, consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting anomalous deserialization activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T18:19:40.248Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb3b4

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/27/2026, 12:00:52 AM

Last updated: 3/23/2026, 7:44:45 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses