Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-59185cvecve-2025-59185cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:00:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:43:48 UTC

Technical Analysis

CVE-2025-59185 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 11 Version 25H2, specifically build 10.0.26200.0. The flaw resides in the Windows Core Shell component, where an attacker can externally influence the file name or path used by the system. This manipulation enables spoofing attacks over a network, potentially misleading users or systems by presenting falsified file paths or names. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as opening a crafted file or link. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely without local access. The CVSS v3.1 score is 6.5, indicating a medium severity level, with high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability was reserved on 2025-09-10 and published on 2025-10-14. This vulnerability could be leveraged to conduct spoofing attacks that may lead to information disclosure or phishing attempts by manipulating file paths that users or applications trust.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality due to potential spoofing attacks that could deceive users or automated systems into trusting malicious files or paths. This could lead to information disclosure, credential theft, or further social engineering attacks. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, which heavily rely on Windows 11 systems, could be targeted to gain unauthorized access to sensitive data. Since the attack requires user interaction, phishing campaigns or malicious network traffic could be vectors for exploitation. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the threat of data leakage or trust exploitation. The absence of known exploits currently limits immediate risk but also suggests the need for proactive mitigation. The medium severity indicates that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or combination with other vulnerabilities.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply patches immediately once they are released for Windows 11 Version 25H2 (build 10.0.26200.0). 2. Restrict network exposure of Windows 11 systems, especially those in sensitive environments, by implementing network segmentation and firewall rules to limit access to trusted sources only. 3. Educate users about the risks of interacting with unsolicited files, links, or network shares, emphasizing caution with unexpected content that could exploit path spoofing. 4. Employ endpoint protection solutions capable of detecting anomalous file path manipulations or suspicious network activity related to file access. 5. Use application whitelisting and enforce strict file execution policies to reduce the risk of executing maliciously crafted files. 6. Conduct regular security awareness training focusing on social engineering and spoofing techniques. 7. Implement logging and monitoring to detect unusual file path usage or access patterns that could indicate exploitation attempts. 8. Evaluate and harden network protocols and services that interact with file paths to minimize attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-10T23:00:43.461Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858a3dd1bfb0b7e401a2

Added to database: 10/14/2025, 5:16:58 PM

Last enriched: 11/27/2025, 3:43:48 AM

Last updated: 11/28/2025, 2:14:17 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats