Cyber Posture

CVE-2025-59252

CriticalRCE

Published: 09 October 2025

Published
09 October 2025
Modified
11 December 2025
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0011 28.6th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59252 is a critical-severity Command Injection (CWE-77) vulnerability in Microsoft 365 Word Copilot. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-2 (Separation of System and User Functionality) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates information input validation at entry points, directly neutralizing special elements to prevent command injection exploitation in Copilot.

prevent

SI-2 requires timely identification, reporting, and correction of flaws like CVE-2025-59252, preventing remote unauthorized command injection and information disclosure.

prevent

SC-2 enforces separation of user and system functionality, blocking user-supplied inputs from interfering with command execution and mitigating injection attacks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection (CWE-77) in a network-accessible service (Copilot) directly enables remote exploitation of public-facing apps (T1190) and arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to disclose information over a network.

Deeper analysisAI

CVE-2025-59252 is an improper neutralization of special elements used in a command, classified as command injection (CWE-77), affecting Copilot. This vulnerability enables an unauthorized attacker to disclose information over a network. It has a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, scope change, high confidentiality impact, and low integrity impact.

An unauthorized attacker can exploit this vulnerability remotely over the network without authentication, privileges, or user interaction. Successful exploitation allows the attacker to inject malicious commands, resulting in the disclosure of sensitive information, with potential for limited integrity modifications due to the changed scope.

The Microsoft Security Response Center (MSRC) provides details on this vulnerability, including update guidance, at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252.

Details

CWE(s)

Affected Products

microsoft
365 word copilot
all versions

CVEs Like This One

CVE-2025-59272Same vendor: Microsoft
CVE-2025-59286Same vendor: Microsoft
CVE-2026-21521Same product: Microsoft 365 Word Copilot
CVE-2026-21520Same vendor: Microsoft
CVE-2026-32194Same vendor: Microsoft
CVE-2025-55227Same vendor: Microsoft
CVE-2025-24049Same vendor: Microsoft
CVE-2026-20841Same vendor: Microsoft
CVE-2025-21410Same vendor: Microsoft
CVE-2026-20960Same vendor: Microsoft

References