Skip to main content

CVE-2025-30387: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microsoft Azure AI Document Intelligence Studio

Critical
VulnerabilityCVE-2025-30387cvecve-2025-30387cwe-22
Published: Tue May 13 2025 (05/13/2025, 16:58:46 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Azure AI Document Intelligence Studio

Description

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:25:20 UTC

Technical Analysis

CVE-2025-30387 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects Microsoft Azure AI Document Intelligence Studio version 1.0.0. The flaw allows an unauthorized attacker to manipulate file path inputs to access files and directories outside the intended restricted directory boundaries. By exploiting this path traversal, an attacker can potentially read, modify, or execute files that should be inaccessible, leading to privilege escalation over the network without requiring any authentication or user interaction. The CVSS v3.1 base score of 9.8 reflects the severity, highlighting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is publicly disclosed as of May 13, 2025, but no known exploits in the wild have been reported yet. The absence of patch links suggests that a fix may not have been released at the time of this report, increasing the urgency for organizations to monitor updates and apply mitigations promptly. Given that Azure AI Document Intelligence Studio is a cloud-based AI service used for document processing and analysis, exploitation could lead to unauthorized data access, manipulation of AI workflows, and disruption of document processing pipelines, severely impacting business operations and data security.

Potential Impact

For European organizations, the impact of CVE-2025-30387 can be significant due to the widespread adoption of Microsoft Azure services across Europe, including Azure AI offerings. Organizations relying on Azure AI Document Intelligence Studio for processing sensitive documents—such as financial institutions, healthcare providers, legal firms, and government agencies—face risks of unauthorized data exposure and potential data integrity violations. The ability to elevate privileges remotely without authentication means attackers could gain control over document processing environments, leading to data breaches, intellectual property theft, and operational disruptions. This could also result in non-compliance with stringent European data protection regulations such as GDPR, exposing organizations to legal and financial penalties. Additionally, the disruption of AI workflows could degrade service quality and trust in automated document processing solutions, impacting business continuity and customer confidence.

Mitigation Recommendations

Given the critical nature of this vulnerability and the lack of an immediate patch, European organizations should implement several specific mitigations: 1) Restrict network access to Azure AI Document Intelligence Studio instances using Azure Firewall and Network Security Groups (NSGs) to limit exposure to trusted IP addresses and internal networks only. 2) Employ Azure Role-Based Access Control (RBAC) to enforce the principle of least privilege, ensuring that only authorized users and services can interact with the AI Document Intelligence Studio. 3) Monitor and audit file access logs and AI service activity using Azure Monitor and Azure Security Center to detect anomalous access patterns indicative of exploitation attempts. 4) Use Azure Private Link or service endpoints to isolate the service from public internet exposure. 5) Implement input validation and sanitization at the application layer if custom integrations exist, to prevent malicious path inputs. 6) Stay informed on Microsoft security advisories and apply patches or updates immediately upon release. 7) Consider deploying Web Application Firewalls (WAF) or Intrusion Detection/Prevention Systems (IDS/IPS) that can detect and block path traversal attack signatures targeting Azure services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.815Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9fa

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:25:20 AM

Last updated: 9/26/2025, 5:00:08 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats