CVE-2025-59185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 Version 25H2
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-59185 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw resides in the Windows Core Shell component, where an attacker can externally influence file names or paths used by the system. This manipulation enables spoofing attacks over a network, potentially misleading users or systems by presenting falsified file or path information. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as clicking on a malicious link or opening a crafted file. The attack vector is network-based (AV:N), and the vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The CVSS v3.1 base score is 6.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches have been released as of the publication date (October 14, 2025). The vulnerability could be leveraged in targeted phishing or spear-phishing campaigns to deceive users into executing malicious actions or disclosing sensitive information by exploiting the spoofed file paths. The lack of privilege requirements and network attack vector increases the attack surface, especially in environments with exposed Windows 11 endpoints. However, the need for user interaction and the absence of integrity or availability impact somewhat limit the overall risk.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Attackers could use spoofed file paths to trick users into executing malicious files or disclosing sensitive data, potentially leading to data breaches or unauthorized information disclosure. Organizations with remote or hybrid workforces relying on Windows 11 25H2 are particularly vulnerable due to increased network exposure. Critical sectors such as finance, healthcare, and government could face targeted attacks exploiting this flaw to gain footholds or conduct espionage. The vulnerability does not directly affect system integrity or availability, so it is less likely to cause service disruptions or data corruption. However, successful exploitation could facilitate further attacks or lateral movement within networks. The absence of known exploits in the wild provides a window for proactive mitigation. European entities with high Windows 11 adoption and significant network-facing assets should prioritize addressing this vulnerability to reduce risk.
Mitigation Recommendations
1. Implement network segmentation and restrict inbound traffic to Windows 11 endpoints to reduce exposure to network-based attacks. 2. Educate users about the risks of interacting with unknown or suspicious files and links, emphasizing caution with unexpected prompts related to file paths. 3. Monitor logs and endpoint telemetry for unusual file path manipulations or suspicious shell activity indicative of exploitation attempts. 4. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behaviors related to file path spoofing. 5. Disable or limit features in Windows Core Shell that process external file path inputs where feasible until patches are available. 6. Maintain up-to-date backups and incident response plans to quickly address any compromise resulting from exploitation. 7. Once Microsoft releases patches, prioritize their deployment across all affected Windows 11 25H2 systems. 8. Use network intrusion detection systems tuned to detect exploitation patterns of CWE-73 related attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2025-59185: CWE-73: External Control of File Name or Path in Microsoft Windows 11 Version 25H2
Description
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-59185 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The flaw resides in the Windows Core Shell component, where an attacker can externally influence file names or paths used by the system. This manipulation enables spoofing attacks over a network, potentially misleading users or systems by presenting falsified file or path information. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as clicking on a malicious link or opening a crafted file. The attack vector is network-based (AV:N), and the vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The CVSS v3.1 base score is 6.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches have been released as of the publication date (October 14, 2025). The vulnerability could be leveraged in targeted phishing or spear-phishing campaigns to deceive users into executing malicious actions or disclosing sensitive information by exploiting the spoofed file paths. The lack of privilege requirements and network attack vector increases the attack surface, especially in environments with exposed Windows 11 endpoints. However, the need for user interaction and the absence of integrity or availability impact somewhat limit the overall risk.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Attackers could use spoofed file paths to trick users into executing malicious files or disclosing sensitive data, potentially leading to data breaches or unauthorized information disclosure. Organizations with remote or hybrid workforces relying on Windows 11 25H2 are particularly vulnerable due to increased network exposure. Critical sectors such as finance, healthcare, and government could face targeted attacks exploiting this flaw to gain footholds or conduct espionage. The vulnerability does not directly affect system integrity or availability, so it is less likely to cause service disruptions or data corruption. However, successful exploitation could facilitate further attacks or lateral movement within networks. The absence of known exploits in the wild provides a window for proactive mitigation. European entities with high Windows 11 adoption and significant network-facing assets should prioritize addressing this vulnerability to reduce risk.
Mitigation Recommendations
1. Implement network segmentation and restrict inbound traffic to Windows 11 endpoints to reduce exposure to network-based attacks. 2. Educate users about the risks of interacting with unknown or suspicious files and links, emphasizing caution with unexpected prompts related to file paths. 3. Monitor logs and endpoint telemetry for unusual file path manipulations or suspicious shell activity indicative of exploitation attempts. 4. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behaviors related to file path spoofing. 5. Disable or limit features in Windows Core Shell that process external file path inputs where feasible until patches are available. 6. Maintain up-to-date backups and incident response plans to quickly address any compromise resulting from exploitation. 7. Once Microsoft releases patches, prioritize their deployment across all affected Windows 11 25H2 systems. 8. Use network intrusion detection systems tuned to detect exploitation patterns of CWE-73 related attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-10T23:00:43.461Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee858a3dd1bfb0b7e401a2
Added to database: 10/14/2025, 5:16:58 PM
Last enriched: 1/2/2026, 10:40:16 PM
Last updated: 1/19/2026, 8:01:17 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.