Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64676: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Microsoft Purview

0
High
VulnerabilityCVE-2025-64676cvecve-2025-64676cwe-94
Published: Thu Dec 18 2025 (12/18/2025, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Purview

Description

'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:11:52 UTC

Technical Analysis

CVE-2025-64676 is a vulnerability classified under CWE-94, indicating improper control over code generation, commonly known as code injection. This flaw exists in Microsoft Purview, a data governance and compliance platform widely used in enterprise environments. The vulnerability allows an attacker with authorized access and high privileges to execute arbitrary code remotely over the network, potentially compromising the affected system. The CVSS 3.1 base score of 7.2 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), and requiring high privileges (PR:H). No user interaction is needed (UI:N), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was published on December 18, 2025, with no known exploits in the wild at the time of disclosure. Although specific affected versions are not listed, the vulnerability affects Microsoft Purview installations that have not yet been patched. The lack of available patches at the time of disclosure increases the urgency for organizations to monitor updates closely. The vulnerability’s nature allows attackers to inject and execute malicious code, potentially leading to full system compromise, data exfiltration, or disruption of services. Given Microsoft Purview’s role in managing sensitive data and compliance workflows, exploitation could have severe consequences for data governance and regulatory adherence.

Potential Impact

For European organizations, the impact of CVE-2025-64676 can be substantial. Microsoft Purview is often deployed in enterprises and public sector organizations to manage data compliance, privacy, and governance, making it a critical component of IT infrastructure. Successful exploitation could lead to unauthorized code execution, enabling attackers to access sensitive data, alter compliance records, or disrupt data governance processes. This could result in regulatory violations under GDPR and other data protection laws, financial penalties, reputational damage, and operational disruptions. The high privileges required to exploit the vulnerability mean that insider threats or compromised administrative accounts pose significant risks. Additionally, the network-based attack vector increases the potential for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive defense, but organizations must act swiftly to prevent exploitation once patches become available.

Mitigation Recommendations

1. Monitor Microsoft’s official channels for patch releases addressing CVE-2025-64676 and apply updates immediately upon availability. 2. Restrict administrative and high-privilege access to Microsoft Purview to only essential personnel, employing the principle of least privilege. 3. Implement multi-factor authentication (MFA) for all accounts with elevated privileges to reduce the risk of credential compromise. 4. Conduct regular audits of Purview access logs and network traffic to detect unusual or unauthorized activities indicative of exploitation attempts. 5. Employ network segmentation to isolate Microsoft Purview servers from less trusted network zones, limiting potential lateral movement. 6. Use endpoint detection and response (EDR) tools to identify suspicious code execution behaviors on systems running Purview. 7. Educate administrators about the risks of code injection vulnerabilities and the importance of secure configuration and monitoring. 8. Prepare incident response plans specifically addressing potential exploitation of code injection vulnerabilities in critical governance platforms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-06T23:40:37.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec20d

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 1/28/2026, 7:11:52 PM

Last updated: 2/6/2026, 10:51:04 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats