CVE-2025-59185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 Version 25H2
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-59185 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw resides in the Windows Core Shell component, where an attacker can externally influence the file name or path used by the system. This manipulation enables an unauthorized attacker to conduct spoofing attacks over a network. Specifically, by controlling file paths or names, the attacker can deceive users or systems into interacting with malicious or misleading resources, potentially exposing sensitive information or causing misdirected actions. The vulnerability is remotely exploitable without requiring privileges (AV:N/PR:N), but it requires user interaction (UI:R), such as opening a crafted file or link. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The confidentiality impact is high (C:H), indicating potential exposure of sensitive data, while integrity and availability impacts are none (I:N/A:N). The CVSS 3.1 base score is 6.5, reflecting a medium severity level. No known exploits have been reported in the wild, and no official patches have been published yet. The vulnerability was reserved on 2025-09-10 and published on 2025-10-14. Given the nature of the flaw, attackers could leverage it to perform phishing or spoofing campaigns that mislead users into divulging credentials or executing unintended actions, particularly in networked environments where Windows 11 25H2 is deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality due to the potential for spoofing attacks that can deceive users or systems into interacting with malicious content. Sectors relying heavily on Windows 11 25H2, such as finance, healthcare, government, and critical infrastructure, could face targeted phishing or social engineering campaigns exploiting this flaw. The lack of required privileges lowers the barrier to exploitation, increasing the threat surface. Although integrity and availability are not directly impacted, the confidentiality breach could lead to secondary effects like credential theft or unauthorized access. Network-exposed systems and endpoints used by employees are particularly vulnerable, potentially enabling attackers to bypass security controls through deceptive file paths or names. The absence of known exploits currently limits immediate risk, but the medium severity score and ease of exploitation suggest that attackers may develop exploits once patches are unavailable. European organizations must consider this vulnerability in their risk assessments, especially those with extensive Windows 11 deployments and remote workforce scenarios.
Mitigation Recommendations
1. Implement strict input validation and sanitization at network boundaries and endpoints to prevent malicious file path or name manipulation. 2. Educate users about the risks of interacting with unsolicited files or links, emphasizing caution with unexpected content. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous file path or name patterns. 4. Use application whitelisting and endpoint protection solutions to restrict execution of unauthorized or suspicious files. 5. Monitor network traffic and logs for signs of spoofing or unusual file access patterns. 6. Segment networks to limit exposure of vulnerable Windows 11 25H2 systems, especially those accessible from untrusted networks. 7. Prepare for patch deployment by tracking Microsoft advisories and testing updates promptly once available. 8. Consider deploying multi-factor authentication (MFA) to reduce impact of potential credential theft resulting from spoofing attacks. 9. Review and harden group policies related to file handling and shell behavior to minimize exploitation vectors. 10. Conduct regular security awareness training focusing on social engineering and spoofing tactics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-59185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 Version 25H2
Description
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-59185 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw resides in the Windows Core Shell component, where an attacker can externally influence the file name or path used by the system. This manipulation enables an unauthorized attacker to conduct spoofing attacks over a network. Specifically, by controlling file paths or names, the attacker can deceive users or systems into interacting with malicious or misleading resources, potentially exposing sensitive information or causing misdirected actions. The vulnerability is remotely exploitable without requiring privileges (AV:N/PR:N), but it requires user interaction (UI:R), such as opening a crafted file or link. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The confidentiality impact is high (C:H), indicating potential exposure of sensitive data, while integrity and availability impacts are none (I:N/A:N). The CVSS 3.1 base score is 6.5, reflecting a medium severity level. No known exploits have been reported in the wild, and no official patches have been published yet. The vulnerability was reserved on 2025-09-10 and published on 2025-10-14. Given the nature of the flaw, attackers could leverage it to perform phishing or spoofing campaigns that mislead users into divulging credentials or executing unintended actions, particularly in networked environments where Windows 11 25H2 is deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality due to the potential for spoofing attacks that can deceive users or systems into interacting with malicious content. Sectors relying heavily on Windows 11 25H2, such as finance, healthcare, government, and critical infrastructure, could face targeted phishing or social engineering campaigns exploiting this flaw. The lack of required privileges lowers the barrier to exploitation, increasing the threat surface. Although integrity and availability are not directly impacted, the confidentiality breach could lead to secondary effects like credential theft or unauthorized access. Network-exposed systems and endpoints used by employees are particularly vulnerable, potentially enabling attackers to bypass security controls through deceptive file paths or names. The absence of known exploits currently limits immediate risk, but the medium severity score and ease of exploitation suggest that attackers may develop exploits once patches are unavailable. European organizations must consider this vulnerability in their risk assessments, especially those with extensive Windows 11 deployments and remote workforce scenarios.
Mitigation Recommendations
1. Implement strict input validation and sanitization at network boundaries and endpoints to prevent malicious file path or name manipulation. 2. Educate users about the risks of interacting with unsolicited files or links, emphasizing caution with unexpected content. 3. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous file path or name patterns. 4. Use application whitelisting and endpoint protection solutions to restrict execution of unauthorized or suspicious files. 5. Monitor network traffic and logs for signs of spoofing or unusual file access patterns. 6. Segment networks to limit exposure of vulnerable Windows 11 25H2 systems, especially those accessible from untrusted networks. 7. Prepare for patch deployment by tracking Microsoft advisories and testing updates promptly once available. 8. Consider deploying multi-factor authentication (MFA) to reduce impact of potential credential theft resulting from spoofing attacks. 9. Review and harden group policies related to file handling and shell behavior to minimize exploitation vectors. 10. Conduct regular security awareness training focusing on social engineering and spoofing tactics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-10T23:00:43.461Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee858a3dd1bfb0b7e401a2
Added to database: 10/14/2025, 5:16:58 PM
Last enriched: 10/14/2025, 6:01:29 PM
Last updated: 10/16/2025, 12:42:17 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.