CVE-2025-49701
Published: 08 July 2025
Summary
CVE-2025-49701 is a high-severity Improper Authorization (CWE-285) vulnerability in Microsoft Sharepoint Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to system resources, directly mitigating the improper authorization flaw that allows low-privileged users to execute code in SharePoint.
AC-24 ensures access control decisions are based on valid policies, addressing the flawed authorization mechanisms enabling remote code execution.
AC-6 applies least privilege to restrict low-privileged authenticated users from performing actions that lead to arbitrary code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper authorization in public-facing SharePoint server directly enables remote arbitrary code execution by an authenticated attacker.
NVD Description
Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-49701, published on 2025-07-08, is an improper authorization vulnerability (CWE-285) affecting Microsoft Office SharePoint. The issue, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), stems from flawed authorization mechanisms that enable an authorized attacker to execute code over a network.
An attacker requires low privileges (PR:L), such as those of an authenticated user, to exploit the vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation grants high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), allowing arbitrary code execution on the targeted SharePoint server.
Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49701.
Details
- CWE(s)