Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49704: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-49704cvecve-2025-49704cwe-94
Published: Tue Jul 08 2025 (07/08/2025, 16:58:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 10/21/2025, 21:20:14 UTC

Technical Analysis

CVE-2025-49704 is a vulnerability identified in Microsoft SharePoint Enterprise Server 2016 (version 16.0.0) involving improper control over the generation of code, categorized as CWE-94 (Code Injection). This vulnerability allows an attacker with authorized access to the SharePoint server to inject and execute arbitrary code remotely over the network. The attack vector requires the attacker to have some level of privileges (PR:L - low privileges) but does not require user interaction (UI:N), making it easier to exploit in automated or targeted attacks. The vulnerability affects the core SharePoint service responsible for handling code generation, which, when improperly controlled, can be manipulated to execute malicious payloads. The CVSS v3.1 base score of 8.8 indicates a high severity, with critical impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is exploitable remotely (AV:N) with low attack complexity (AC:L). Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized quickly once details or exploits become available. The lack of user interaction and the ability to execute code remotely make this a significant threat, especially in environments where SharePoint is exposed to internal or external networks. The vulnerability was reserved in June 2025 and published in July 2025, with no patches currently linked, indicating organizations should monitor for updates from Microsoft and prepare mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-49704 is substantial. SharePoint is widely used across enterprises, government agencies, and critical infrastructure sectors in Europe for collaboration and document management. Successful exploitation could lead to full system compromise, data breaches involving sensitive or regulated information (e.g., GDPR-protected data), disruption of business operations, and potential lateral movement within networks. The high confidentiality impact risks exposure of intellectual property and personal data, while integrity and availability impacts could result in data tampering and denial of service. Organizations in sectors such as finance, healthcare, government, and manufacturing, which rely heavily on SharePoint, face increased operational and reputational risks. Additionally, the vulnerability could be leveraged for espionage or sabotage, especially given geopolitical tensions affecting Europe. The absence of public exploits currently provides a window for proactive defense, but the ease of exploitation and network accessibility make timely mitigation critical.

Mitigation Recommendations

1. Immediately inventory all SharePoint Enterprise Server 2016 deployments to identify affected versions (16.0.0). 2. Monitor Microsoft security advisories closely for the release of official patches or updates addressing CVE-2025-49704 and apply them promptly. 3. Restrict network access to SharePoint servers using network segmentation and firewalls, limiting access to trusted users and systems only. 4. Enforce the principle of least privilege by reviewing and minimizing user permissions on SharePoint, ensuring only necessary privileges are granted. 5. Implement robust monitoring and logging of SharePoint activities to detect anomalous behavior indicative of code injection attempts or unauthorized access. 6. Employ application whitelisting and endpoint protection solutions capable of detecting and blocking suspicious code execution on SharePoint servers. 7. Conduct targeted penetration testing and vulnerability assessments focusing on SharePoint environments to identify potential exploitation vectors. 8. Educate administrators and users about the risks and signs of exploitation to enhance early detection and response capabilities. 9. Consider deploying web application firewalls (WAFs) with custom rules to detect and block injection patterns targeting SharePoint. 10. Prepare incident response plans specifically addressing SharePoint compromise scenarios to reduce response time and impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T19:59:44.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c60

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 10/21/2025, 9:20:14 PM

Last updated: 11/22/2025, 4:23:22 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats