Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20943: CWE-426: Untrusted Search Path in Microsoft Microsoft SharePoint Server 2019

0
High
VulnerabilityCVE-2026-20943cvecve-2026-20943cwe-426
Published: Tue Jan 13 2026 (01/13/2026, 17:56:45 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Server 2019

Description

Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:00:17 UTC

Technical Analysis

CVE-2026-20943 is a vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft SharePoint Server 2019 version 16.0.0. The vulnerability arises because SharePoint Server improperly handles the search path for executable files, allowing an attacker with local access to influence which executable is run by placing a malicious executable in a location that is searched before the legitimate one. This can lead to arbitrary code execution with the privileges of the user running the SharePoint service or application. The attack requires local access and user interaction, and the attack complexity is high, meaning the attacker must carefully craft the environment to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, data manipulation, or service disruption. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and rated with a CVSS 3.1 score of 7.0 (high severity). The vulnerability is particularly concerning for organizations relying on SharePoint Server 2019 for collaboration and document management, as it could be leveraged by insiders or attackers who gain local access to escalate privileges or move laterally within a network. The lack of available patches at the time of disclosure necessitates immediate mitigation strategies to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2026-20943 can be significant, especially in sectors heavily dependent on Microsoft SharePoint Server 2019 for internal collaboration, document management, and workflow automation. Successful exploitation could allow attackers to execute arbitrary code locally, potentially leading to full system compromise, data exfiltration, or disruption of critical business processes. This is particularly critical for industries such as finance, government, healthcare, and energy, where data confidentiality and system availability are paramount. The vulnerability could also facilitate lateral movement within corporate networks, increasing the risk of broader compromise. Given the high confidentiality, integrity, and availability impact, organizations face risks including regulatory non-compliance (e.g., GDPR), reputational damage, and operational downtime. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who have already gained foothold in the network.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for SharePoint Server 2019 as soon as they become available. 2. Restrict local user permissions rigorously, ensuring that only trusted administrators have rights to install or modify executables and system paths on SharePoint servers. 3. Implement application whitelisting and code integrity policies to prevent execution of unauthorized binaries. 4. Harden the server environment by validating and controlling the search paths used by SharePoint and related services to prevent loading executables from untrusted directories. 5. Conduct regular audits of local file system permissions and executable locations to detect suspicious files or path manipulations. 6. Educate users and administrators about the risks of local code execution vulnerabilities and enforce strict controls on removable media and local software installation. 7. Employ endpoint detection and response (EDR) solutions to detect anomalous process executions or privilege escalations on SharePoint servers. 8. Segment SharePoint servers within the network to limit lateral movement opportunities in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae4a60475309f9ae20b

Added to database: 1/13/2026, 6:11:48 PM

Last enriched: 2/4/2026, 9:00:17 AM

Last updated: 2/7/2026, 12:54:05 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats