CVE-2025-59228
Published: 14 October 2025
Summary
CVE-2025-59228 is a high-severity Improper Input Validation (CWE-20) vulnerability in Microsoft Sharepoint Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly implements information input validation mechanisms to prevent exploitation of the improper input validation vulnerability in Microsoft Office SharePoint.
Requires timely flaw remediation, including patching CVE-2025-59228 as directed by Microsoft's advisory, to eliminate the specific vulnerability.
Provides memory protection safeguards that mitigate arbitrary code execution even if invalid input bypasses validation in the SharePoint service.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote code execution via improper input validation in Microsoft Office SharePoint, a public-facing web application, directly mapping to exploitation of public-facing applications.
NVD Description
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-59228 is an improper input validation vulnerability affecting Microsoft Office SharePoint. Published on 2025-10-14T17:16:03.747, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-20 (Improper Input Validation), with additional NVD-CWE-noinfo classification.
An authorized attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation enables arbitrary code execution in the context of the SharePoint service, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) without scope change (S:U).
Microsoft's advisory provides guidance on this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228.
Details
- CWE(s)