CVE-2025-29817: CWE-427: Uncontrolled Search Path Element in Microsoft Power Automate for Desktop
Uncontrolled search path element in Power Automate allows an authorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-29817 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Microsoft Power Automate for Desktop version 1.0.0.0. This vulnerability arises because the application improperly controls the directories it searches when loading resources or executables. An attacker with authorized access can manipulate the search path to cause the application to load malicious or unintended files, leading to unauthorized disclosure of sensitive information over a network. The vulnerability requires the attacker to have privileges on the system and involves user interaction, such as triggering a specific automated workflow. The CVSS v3.1 score is 5.7 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. The attack vector is network-based with low complexity, but privileges and user interaction are required. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned by Microsoft. The flaw could be exploited in environments where Power Automate workflows automate sensitive processes, potentially leaking confidential data if the search path is manipulated by an attacker.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information processed or stored by Power Automate workflows. This could include business-critical data, personally identifiable information (PII), or intellectual property. Since Power Automate is often used to automate enterprise processes, exploitation could undermine confidentiality and compliance with data protection regulations such as GDPR. Although integrity and availability are not directly affected, information leakage can lead to reputational damage, regulatory penalties, and increased risk of follow-on attacks. The requirement for authorized access and user interaction limits the attack scope but does not eliminate risk in environments with many privileged users or where social engineering is feasible. Organizations in sectors relying heavily on automation and Microsoft ecosystems, such as finance, healthcare, and government, may face elevated risks.
Mitigation Recommendations
1. Monitor for updates from Microsoft and apply patches immediately once released for Power Automate for Desktop. 2. Restrict and audit user privileges to minimize the number of users with the ability to exploit the vulnerability. 3. Implement strict environment and path controls, ensuring that search paths used by Power Automate workflows do not include untrusted or user-writable directories. 4. Use application whitelisting and endpoint protection solutions to detect and block unauthorized file executions or modifications in directories involved in the search path. 5. Educate users about the risks of social engineering and the importance of cautious interaction with automated workflows. 6. Conduct regular security assessments of automated workflows to identify and remediate insecure configurations or dependencies. 7. Employ network segmentation to limit the exposure of systems running Power Automate to untrusted networks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-29817: CWE-427: Uncontrolled Search Path Element in Microsoft Power Automate for Desktop
Description
Uncontrolled search path element in Power Automate allows an authorized attacker to disclose information over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-29817 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) found in Microsoft Power Automate for Desktop version 1.0.0.0. This vulnerability arises because the application improperly controls the directories it searches when loading resources or executables. An attacker with authorized access can manipulate the search path to cause the application to load malicious or unintended files, leading to unauthorized disclosure of sensitive information over a network. The vulnerability requires the attacker to have privileges on the system and involves user interaction, such as triggering a specific automated workflow. The CVSS v3.1 score is 5.7 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. The attack vector is network-based with low complexity, but privileges and user interaction are required. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned by Microsoft. The flaw could be exploited in environments where Power Automate workflows automate sensitive processes, potentially leaking confidential data if the search path is manipulated by an attacker.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information processed or stored by Power Automate workflows. This could include business-critical data, personally identifiable information (PII), or intellectual property. Since Power Automate is often used to automate enterprise processes, exploitation could undermine confidentiality and compliance with data protection regulations such as GDPR. Although integrity and availability are not directly affected, information leakage can lead to reputational damage, regulatory penalties, and increased risk of follow-on attacks. The requirement for authorized access and user interaction limits the attack scope but does not eliminate risk in environments with many privileged users or where social engineering is feasible. Organizations in sectors relying heavily on automation and Microsoft ecosystems, such as finance, healthcare, and government, may face elevated risks.
Mitigation Recommendations
1. Monitor for updates from Microsoft and apply patches immediately once released for Power Automate for Desktop. 2. Restrict and audit user privileges to minimize the number of users with the ability to exploit the vulnerability. 3. Implement strict environment and path controls, ensuring that search paths used by Power Automate workflows do not include untrusted or user-writable directories. 4. Use application whitelisting and endpoint protection solutions to detect and block unauthorized file executions or modifications in directories involved in the search path. 5. Educate users about the risks of social engineering and the importance of cautious interaction with automated workflows. 6. Conduct regular security assessments of automated workflows to identify and remediate insecure configurations or dependencies. 7. Employ network segmentation to limit the exposure of systems running Power Automate to untrusted networks.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-11T22:56:43.942Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebc4f
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:29:59 AM
Last updated: 3/26/2026, 7:05:49 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.