Skip to main content

CVE-2025-47733: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Microsoft Power Apps

Critical
VulnerabilityCVE-2025-47733cvecve-2025-47733cwe-918
Published: Thu May 08 2025 (05/08/2025, 22:17:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Power Apps

Description

Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network

AI-Powered Analysis

AILast updated: 09/10/2025, 03:29:23 UTC

Technical Analysis

CVE-2025-47733 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in Microsoft Power Apps, a widely used low-code platform for building custom business applications. SSRF vulnerabilities allow attackers to abuse a vulnerable server to send crafted requests to internal or external systems, potentially bypassing network access controls. In this case, an unauthorized attacker can exploit the SSRF flaw without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality and integrity, enabling attackers to disclose sensitive information over the network and potentially manipulate data or application behavior. The CVSS score of 9.1 (critical) reflects the high severity due to the ease of exploitation, lack of required privileges, and the potential for significant data exposure. Although no known exploits are currently reported in the wild, the vulnerability's presence in Microsoft Power Apps—a platform integrated into many enterprise environments—raises concerns about potential future exploitation. The absence of specific affected versions suggests the vulnerability may impact multiple or all current versions of Power Apps until patched. The vulnerability is categorized under CWE-918, which involves SSRF attacks that can lead to unauthorized information disclosure or further network penetration. Given Power Apps' role in automating workflows and integrating with various data sources, exploitation could lead to leakage of sensitive business data or unauthorized internal network access.

Potential Impact

For European organizations, the impact of CVE-2025-47733 could be significant due to the widespread adoption of Microsoft Power Apps across various sectors including finance, healthcare, manufacturing, and government. Exploitation of this SSRF vulnerability could allow attackers to access internal services that are otherwise protected by firewalls, leading to unauthorized disclosure of confidential information such as personal data protected under GDPR, intellectual property, or internal business processes. This could result in regulatory penalties, reputational damage, and operational disruptions. Additionally, attackers might leverage the SSRF to pivot within the network, potentially escalating attacks to more critical systems. The lack of authentication requirement increases the risk of remote exploitation from external threat actors. European organizations with complex internal networks and integrations via Power Apps are particularly at risk, as the vulnerability could bypass traditional perimeter defenses. The critical severity underscores the urgency for European entities to address this vulnerability promptly to avoid data breaches and compliance violations.

Mitigation Recommendations

To mitigate CVE-2025-47733, European organizations should immediately assess their use of Microsoft Power Apps and prioritize patching once Microsoft releases an official fix. Until a patch is available, organizations should implement network-level controls such as restricting outbound HTTP/HTTPS requests from Power Apps environments to only trusted endpoints, using web application firewalls (WAFs) with custom rules to detect and block SSRF patterns, and monitoring logs for unusual request patterns indicative of SSRF exploitation attempts. Additionally, organizations should review and minimize the permissions and data access granted to Power Apps applications, applying the principle of least privilege. Employing network segmentation to isolate critical internal services can limit the impact of SSRF exploitation. Security teams should also conduct threat hunting and vulnerability scanning focused on SSRF indicators within their Power Apps deployments. Finally, raising user and developer awareness about secure coding practices and input validation can reduce the risk of SSRF and similar vulnerabilities in custom Power Apps solutions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-08T21:59:54.728Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba36

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:29:23 AM

Last updated: 9/23/2025, 9:49:16 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats