Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30387: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microsoft Azure AI Document Intelligence Studio

0
Critical
VulnerabilityCVE-2025-30387cvecve-2025-30387cwe-22
Published: Tue May 13 2025 (05/13/2025, 16:58:46 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Azure AI Document Intelligence Studio

Description

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:47:14 UTC

Technical Analysis

CVE-2025-30387 is a critical security vulnerability identified in Microsoft Azure AI Document Intelligence Studio version 1.0.0. The flaw is classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability allows an unauthenticated attacker to craft specially designed requests that manipulate file path parameters, bypassing directory restrictions imposed by the application. As a result, the attacker can access or modify files outside the intended directory scope, potentially leading to privilege escalation and unauthorized control over the system. The vulnerability is exploitable remotely over the network without requiring any user interaction or prior authentication, making it highly dangerous. The CVSS v3.1 base score is 9.8, reflecting critical severity with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability’s nature and ease of exploitation make it a prime target for attackers once exploit code becomes available. The vulnerability was reserved in March 2025 and published in May 2025, indicating recent discovery and disclosure. The lack of available patches at the time of reporting underscores the urgency for organizations to implement interim mitigations and monitor for suspicious activity. Given the product’s role in processing sensitive AI-driven document intelligence tasks within Azure, exploitation could lead to exposure or tampering of sensitive data, disruption of AI workflows, and potential lateral movement within cloud environments.

Potential Impact

For European organizations, the impact of CVE-2025-30387 is significant due to the widespread adoption of Microsoft Azure cloud services and increasing reliance on AI-powered document processing. Successful exploitation could result in unauthorized access to sensitive documents, intellectual property theft, and disruption of critical AI services. This could undermine compliance with stringent European data protection regulations such as GDPR, leading to legal and financial repercussions. Additionally, the compromise of AI document intelligence workflows could affect sectors like finance, healthcare, and government, where document integrity and confidentiality are paramount. The ability to escalate privileges without authentication increases the risk of broader cloud environment compromise, potentially affecting multiple tenants in shared infrastructure. The high severity and network-based exploitation vector mean attackers can launch attacks remotely, increasing the threat surface for European enterprises. The absence of known exploits currently provides a window for proactive defense, but the critical nature demands immediate attention to prevent future attacks.

Mitigation Recommendations

Until an official patch is released by Microsoft, European organizations should implement several specific mitigations: 1) Employ strict input validation and sanitization on all user-supplied file path parameters to prevent path traversal attempts. 2) Restrict permissions on directories and files accessed by Azure AI Document Intelligence Studio to the minimum necessary, enforcing the principle of least privilege. 3) Use Azure’s built-in network segmentation and firewall capabilities to limit access to the AI Document Intelligence Studio service from trusted IP ranges only. 4) Monitor logs and alerts for unusual file access patterns or attempts to access restricted directories. 5) Implement application-layer security controls such as Web Application Firewalls (WAFs) with custom rules to detect and block path traversal payloads. 6) Prepare for rapid deployment of patches by maintaining an up-to-date asset inventory and testing environment. 7) Educate security teams on the specifics of this vulnerability to enhance incident response readiness. 8) Consider isolating critical AI workloads in dedicated Azure subscriptions or resource groups to limit blast radius in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.815Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9fa

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:47:14 AM

Last updated: 3/21/2026, 6:27:21 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses