Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64676: CWE-35: Path Traversal: '.../...//' in Microsoft Microsoft Purview

0
High
VulnerabilityCVE-2025-64676cvecve-2025-64676cwe-35cwe-94
Published: Thu Dec 18 2025 (12/18/2025, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Purview

Description

'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:55:03 UTC

Technical Analysis

CVE-2025-64676 is a path traversal vulnerability categorized under CWE-35 affecting Microsoft Purview, a data governance and compliance product by Microsoft. The vulnerability arises from improper sanitization of path inputs containing sequences like '.../...//', which can be manipulated by an authorized attacker to traverse directories beyond intended boundaries. This traversal can lead to unauthorized file access and potentially enable remote code execution over the network. The vulnerability requires the attacker to have valid privileges (high privileges) but does not require user interaction, making it easier to exploit once credentials are obtained. The CVSS v3.1 base score of 7.2 reflects a high severity level, with impacts on confidentiality, integrity, and availability (all rated high). The vulnerability was reserved in early November 2025 and published in December 2025, with no patches or known exploits publicly disclosed at the time of analysis. The lack of patch links suggests that mitigation relies currently on compensating controls. The vulnerability's presence in Microsoft Purview is critical given the product's role in managing sensitive organizational data, compliance, and governance, making exploitation potentially damaging.

Potential Impact

The exploitation of CVE-2025-64676 can have severe consequences for organizations worldwide. Successful attacks can lead to unauthorized disclosure of sensitive data, modification or deletion of critical files, and disruption of data governance processes. Given Microsoft Purview's role in compliance and data management, attackers could manipulate data classification, retention policies, or audit logs, undermining regulatory compliance and increasing legal and financial risks. The ability to execute code remotely elevates the threat to full system compromise, potentially allowing lateral movement within enterprise networks. Organizations relying heavily on Microsoft Purview for data governance, especially those in regulated industries such as finance, healthcare, and government, face heightened risks. The requirement for attacker authentication limits exposure to insider threats or compromised credentials but does not eliminate risk, especially in environments with weak access controls or credential management.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls to limit Microsoft Purview administrative and user privileges to the minimum necessary. Employ strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of credential compromise. Monitor and audit access logs for unusual path traversal attempts or unauthorized file access patterns. Network segmentation can help contain potential exploitation impact by isolating Purview servers from broader enterprise networks. Additionally, organizations should review and harden input validation and path handling configurations if configurable within Purview. Engage with Microsoft support and subscribe to security advisories to promptly apply patches once available. Conduct internal penetration testing focusing on path traversal vectors to identify and remediate similar weaknesses proactively. Finally, prepare incident response plans to address potential exploitation scenarios involving data governance systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-06T23:40:37.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec20d

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 2/27/2026, 6:55:03 AM

Last updated: 3/26/2026, 3:53:31 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses