CVE-2025-47954
Published: 12 August 2025
Summary
CVE-2025-47954 is a high-severity SQL Injection (CWE-89) vulnerability in Microsoft Sql Server 2022. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 21.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly and comprehensively mitigates SQL injection (CWE-89) by requiring validation of information inputs to prevent improper neutralization of special elements in SQL commands.
Requires timely identification, reporting, and correction of known flaws like this SQL injection vulnerability in SQL Server through patching.
Ensures vulnerabilities such as CVE-2025-47954 are scanned for and remediated promptly to prevent remote privilege escalation exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in SQL Server directly enables remote privilege escalation by an authenticated attacker (T1068).
NVD Description
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
Deeper analysisAI
CVE-2025-47954 is an SQL injection vulnerability (CWE-89) affecting Microsoft SQL Server. Published on 2025-08-12, it arises from improper neutralization of special elements used in an SQL command, enabling an authorized attacker to elevate privileges over a network. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
An attacker requires low privileges (PR:L) to exploit this issue remotely over the network (AV:N), with low complexity (AC:L) and no user interaction (UI:N) needed. Successful exploitation allows privilege escalation, potentially granting unauthorized access to sensitive data and system resources, with high impacts across confidentiality, integrity, and availability.
Microsoft's Security Response Center provides an update guide for this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47954, which details recommended mitigations and patches.
Details
- CWE(s)