Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65037: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Azure Container Apps

0
Critical
VulnerabilityCVE-2025-65037cvecve-2025-65037cwe-94
Published: Thu Dec 18 2025 (12/18/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Container Apps

Description

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 12/18/2025, 22:26:37 UTC

Technical Analysis

CVE-2025-65037 is a critical vulnerability identified in Microsoft Azure Container Apps, a platform-as-a-service offering that enables developers to deploy containerized applications without managing infrastructure. The vulnerability is categorized as CWE-94, which involves improper control over the generation of code, commonly known as code injection. This flaw allows an unauthorized attacker to remotely execute arbitrary code within the Azure Container Apps environment without requiring any privileges or user interaction. The root cause is the insufficient validation or sanitization of inputs that influence code generation processes within the container app runtime or deployment pipeline. Given the CVSS 3.1 base score of 10.0, the vulnerability is exploitable over the network with low complexity and no authentication, leading to a complete compromise of confidentiality, integrity, and availability of the affected systems. This means attackers can potentially execute malicious payloads, manipulate data, disrupt services, or pivot within the cloud environment. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high-priority threat. The lack of available patches at the time of publication increases the urgency for organizations to implement interim protective measures. Azure Container Apps are widely used for scalable microservices and event-driven applications, making this vulnerability a significant risk for cloud-dependent enterprises.

Potential Impact

For European organizations, the impact of CVE-2025-65037 is profound. Exploitation could lead to unauthorized code execution within cloud-hosted containerized applications, resulting in data breaches, service outages, and potential lateral movement within corporate networks. Organizations relying on Azure Container Apps for critical business functions, including financial services, healthcare, and government operations, face risks of operational disruption and loss of sensitive data. The vulnerability undermines trust in cloud infrastructure security and could lead to regulatory non-compliance under GDPR if personal data is compromised. Additionally, attackers exploiting this flaw could deploy ransomware or other malware, causing widespread damage. The cloud-native nature of Azure Container Apps means that compromised containers could serve as entry points to broader cloud environments, amplifying the threat. European entities with hybrid or multi-cloud strategies involving Azure must consider this vulnerability in their risk assessments and incident response planning.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict network access to Azure Container Apps by enforcing strict network segmentation and firewall rules, limiting exposure to trusted IP ranges only. 2) Enable and monitor Azure Security Center and Azure Defender features to detect anomalous activities indicative of exploitation attempts. 3) Employ runtime application self-protection (RASP) and container security tools that can detect and block suspicious code execution patterns. 4) Review and tighten input validation and code generation workflows within containerized applications to minimize injection vectors. 5) Implement strict identity and access management (IAM) policies to reduce the attack surface, even though this vulnerability does not require authentication. 6) Prepare incident response playbooks specifically for cloud container compromise scenarios. 7) Stay informed through Microsoft advisories and subscribe to vulnerability notification services to apply patches immediately upon release. 8) Conduct penetration testing and red team exercises simulating code injection attacks to evaluate defenses. These targeted actions go beyond generic advice by focusing on the unique characteristics of Azure Container Apps and the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-13T16:18:07.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec213

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 12/18/2025, 10:26:37 PM

Last updated: 12/19/2025, 12:01:07 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats