Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47733: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Microsoft Power Pages

0
Critical
VulnerabilityCVE-2025-47733cvecve-2025-47733cwe-918
Published: Thu May 08 2025 (05/08/2025, 22:17:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Power Pages

Description

Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:03:05 UTC

Technical Analysis

CVE-2025-47733 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in Microsoft Power Pages, part of the Microsoft Power Apps suite. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems, potentially bypassing network controls and accessing sensitive resources. In this case, the vulnerability allows an unauthenticated attacker to coerce the Power Pages server into making arbitrary network requests, leading to unauthorized disclosure of information. The CVSS v3.1 score of 9.1 indicates a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality and integrity, with no impact on availability. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it highly exploitable. The lack of specified affected versions suggests that the issue may impact multiple or all current versions of Microsoft Power Pages. The vulnerability was published on May 8, 2025, and is tracked under CWE-918, which covers SSRF issues. This flaw could allow attackers to access internal services, exfiltrate sensitive data, or perform reconnaissance within protected networks by leveraging the trust relationship of the vulnerable server. Given the widespread use of Microsoft Power Platform in enterprise environments, this vulnerability poses a significant risk to organizations relying on these services for business-critical applications.

Potential Impact

For European organizations, the impact of CVE-2025-47733 is substantial. The ability of an unauthenticated attacker to perform SSRF attacks can lead to unauthorized access to internal systems and sensitive data leakage, undermining confidentiality and integrity. This is particularly concerning for sectors handling sensitive personal data, such as finance, healthcare, and government, which are prevalent across Europe and subject to strict data protection regulations like GDPR. Exploitation could facilitate lateral movement within corporate networks, enabling further compromise or espionage. Additionally, the exposure of internal endpoints could reveal network architecture details, aiding attackers in crafting more sophisticated attacks. The critical severity and ease of exploitation increase the urgency for European organizations to assess their exposure and implement mitigations promptly. The reputational damage and regulatory penalties resulting from data breaches caused by this vulnerability could be severe, especially in countries with stringent data protection enforcement.

Mitigation Recommendations

1. Monitor Microsoft’s official channels for patches or updates addressing CVE-2025-47733 and apply them immediately upon release. 2. Until patches are available, implement network-level controls to restrict outbound requests from Microsoft Power Pages servers to only trusted destinations, minimizing the attack surface. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting Power Pages. 4. Conduct thorough logging and monitoring of outbound requests originating from Power Pages to identify anomalous or unauthorized access attempts. 5. Review and limit the permissions and network access of the Power Pages service accounts to reduce potential impact. 6. Educate security teams about SSRF risks and indicators to improve detection and incident response capabilities. 7. Perform internal security assessments and penetration testing focusing on SSRF vectors within Power Platform deployments. 8. Segment internal networks to prevent SSRF exploitation from reaching sensitive internal services. These measures, combined with prompt patching, will significantly reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-08T21:59:54.728Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba36

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 10:03:05 AM

Last updated: 3/25/2026, 4:22:00 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses