Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65037: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Azure Container Apps

0
Critical
VulnerabilityCVE-2025-65037cvecve-2025-65037cwe-94
Published: Thu Dec 18 2025 (12/18/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Container Apps

Description

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:12:29 UTC

Technical Analysis

CVE-2025-65037 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting Microsoft Azure Container Apps. This vulnerability allows an unauthorized attacker to perform remote code execution (RCE) over the network without requiring any privileges or user interaction. The root cause lies in the improper validation and control of dynamically generated code within Azure Container Apps, which can be exploited to inject and execute malicious code. The vulnerability has a CVSS v3.1 base score of 10.0, indicating maximum severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high-priority threat. Azure Container Apps is a managed service for running containerized applications, widely used for scalable cloud-native applications. The vulnerability could allow attackers to gain full control over containerized workloads, potentially leading to data breaches, service disruption, or lateral movement within cloud environments. The lack of currently available patches necessitates immediate attention to monitoring and mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-65037 is significant due to the widespread adoption of Microsoft Azure services across the continent, especially in sectors such as finance, healthcare, government, and critical infrastructure. Successful exploitation could lead to unauthorized access to sensitive data, disruption of business-critical applications, and potential compromise of other connected cloud resources. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously means that organizations could face data theft, data manipulation, and denial of service conditions. Given the cloud-native nature of Azure Container Apps, the attack surface extends to multi-tenant environments, increasing the risk of cross-tenant attacks and broader cloud ecosystem compromise. The absence of authentication and user interaction requirements lowers the barrier for attackers, potentially enabling automated mass exploitation campaigns. This could result in significant operational and reputational damage, regulatory penalties under GDPR, and financial losses for European entities.

Mitigation Recommendations

Until an official patch is released by Microsoft, European organizations should implement the following specific mitigations: 1) Restrict network access to Azure Container Apps by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Employ Azure-native security features such as Azure Defender for Containers and Azure Security Center to monitor for suspicious activities and anomalous code execution patterns. 3) Use Azure Policy to enforce secure configuration baselines and prevent deployment of vulnerable container images. 4) Implement runtime application self-protection (RASP) and container security tools to detect and block code injection attempts. 5) Regularly audit container app configurations and logs for signs of exploitation attempts. 6) Prepare incident response playbooks specifically addressing container compromise scenarios. 7) Educate DevOps teams on secure coding practices to avoid introducing similar vulnerabilities. 8) Plan for rapid deployment of patches once Microsoft releases updates, including testing in staging environments to ensure stability. These measures go beyond generic advice by focusing on container-specific controls and Azure platform capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-13T16:18:07.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec213

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 1/28/2026, 7:12:29 PM

Last updated: 2/7/2026, 11:17:31 AM

Views: 255

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats