Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49704: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-49704cvecve-2025-49704cwe-94
Published: Tue Jul 08 2025 (07/08/2025, 16:58:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:12:15 UTC

Technical Analysis

CVE-2025-49704 is a vulnerability identified in Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0, involving improper control of code generation, commonly known as code injection (CWE-94). This flaw allows an attacker who already has some level of authorized access (privileged user) to execute arbitrary code remotely over the network without requiring any user interaction. The vulnerability stems from insufficient validation or sanitization of inputs that are used to generate executable code within the SharePoint environment, enabling the attacker to inject malicious code that the server will execute. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector being network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the exploit affects only the vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of SharePoint in enterprise environments and the potential for full system compromise. The vulnerability was reserved in June 2025 and published in July 2025, with no patches currently linked, indicating organizations must be vigilant and prepare for imminent remediation. The flaw highlights the risks associated with code injection in complex enterprise software, especially when privileged users can trigger code generation processes without adequate safeguards.

Potential Impact

The impact of CVE-2025-49704 is substantial for organizations worldwide using Microsoft SharePoint Enterprise Server 2016. Successful exploitation allows attackers to execute arbitrary code remotely with elevated privileges, potentially leading to full system compromise. This can result in data breaches, unauthorized data modification, service disruption, and lateral movement within corporate networks. Given SharePoint's role in document management and collaboration, sensitive corporate, financial, and personal data could be exposed or manipulated. The high severity and network exploitability mean attackers can leverage this vulnerability to establish persistent footholds or deploy ransomware and other malware. Organizations relying heavily on SharePoint for internal and external collaboration face risks to operational continuity and regulatory compliance. The absence of public exploits currently provides a window for proactive defense, but the vulnerability's characteristics suggest it could become a favored target for threat actors once exploit code emerges.

Mitigation Recommendations

To mitigate CVE-2025-49704 effectively, organizations should: 1) Monitor Microsoft security advisories closely and apply official patches immediately upon release; 2) Restrict network access to SharePoint servers, especially limiting privileged user access to trusted networks and VPNs; 3) Implement strict role-based access controls to minimize the number of users with privileges capable of triggering code generation; 4) Employ application-layer firewalls or intrusion prevention systems to detect and block suspicious code injection attempts; 5) Conduct thorough input validation and sanitization reviews if custom SharePoint extensions or workflows are used; 6) Enable detailed logging and continuous monitoring of SharePoint activities to detect anomalous behavior indicative of exploitation attempts; 7) Consider isolating SharePoint servers in segmented network zones to reduce lateral movement risk; 8) Educate administrators on the risks of code injection vulnerabilities and the importance of secure configuration; 9) Prepare incident response plans specifically addressing potential SharePoint compromise scenarios; 10) Evaluate alternative collaboration platforms or updated SharePoint versions with improved security postures if patching is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T19:59:44.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c60

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/27/2026, 2:12:15 PM

Last updated: 3/22/2026, 9:15:38 PM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses