Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47172: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-47172cvecve-2025-47172cwe-89
Published: Tue Jun 10 2025 (06/10/2025, 17:02:41 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 23:42:30 UTC

Technical Analysis

CVE-2025-47172 is a critical SQL injection vulnerability identified in Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The flaw arises from improper neutralization of special elements within SQL commands, classified under CWE-89. This vulnerability enables an attacker who has authorized network access and privileges to inject malicious SQL code, potentially leading to arbitrary code execution on the affected server. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) but does require privileges (PR:L), meaning the attacker must have some level of authenticated access to the SharePoint environment. No user interaction is necessary (UI:N), and the vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk. The absence of an official patch at the time of publication necessitates immediate mitigation efforts by organizations. SharePoint Enterprise Server 2016 is widely used in enterprise environments for collaboration and document management, making this vulnerability particularly concerning due to the sensitive data often stored and managed within these systems.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary code remotely on SharePoint servers, leading to full compromise of the system. This includes unauthorized data access, data modification or deletion, and potential disruption of SharePoint services, impacting business operations. The breach of confidentiality could expose sensitive corporate or personal data, while integrity and availability impacts could undermine trust and operational continuity. Given SharePoint's role in many enterprises as a central collaboration platform, exploitation could also facilitate lateral movement within networks, escalating the overall organizational risk. The requirement for some privilege limits exploitation to insiders or attackers who have already gained initial access, but the low complexity and network accessibility increase the likelihood of exploitation once credentials or access are obtained. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency for remediation.

Mitigation Recommendations

Organizations should immediately review and restrict access privileges to SharePoint Enterprise Server 2016, ensuring the principle of least privilege is enforced. Network segmentation and firewall rules should limit access to SharePoint servers to trusted users and systems only. Implement robust monitoring and logging to detect unusual SQL queries or anomalous behavior indicative of SQL injection attempts. Employ Web Application Firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. Until an official patch is released, consider disabling or restricting vulnerable SharePoint features or services if feasible. Conduct thorough security assessments and penetration testing focused on SQL injection vectors within SharePoint environments. Educate administrators and users about the risks and signs of exploitation. Once a patch becomes available, prioritize its deployment in all affected environments. Additionally, maintain regular backups and have an incident response plan ready to mitigate potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-01T17:10:57.981Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f4f1b0bd07c393898c0

Added to database: 6/10/2025, 6:54:07 PM

Last enriched: 2/28/2026, 11:42:30 PM

Last updated: 3/25/2026, 4:31:07 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses