CVE-2025-59503
Published: 23 October 2025
Summary
CVE-2025-59503 is a critical-severity SSRF (CWE-918) vulnerability in Microsoft Azure Compute Resource Provider. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SSRF by validating user-supplied inputs such as URLs and parameters before the server processes or issues requests on their behalf.
AC-4 enforces information flow control policies that restrict unauthorized server-side requests to internal or privileged resources exploited in this SSRF vulnerability.
SC-7 monitors and controls communications at boundaries, detecting and blocking anomalous outbound requests indicative of SSRF exploitation in Azure Compute Gallery.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability in public-facing Azure Compute Gallery (T1190) directly enables remote exploitation without authentication, facilitating privilege escalation (T1068).
NVD Description
Server-side request forgery (ssrf) in Azure Compute Gallery allows an unauthorized attacker to elevate privileges over a network.
Deeper analysisAI
CVE-2025-59503 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting Azure Compute Gallery. Published on 2025-10-23T22:15:48.547, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its network accessibility, low complexity, lack of prerequisite privileges or user interaction, scope change, and high impacts across confidentiality, integrity, and availability.
An unauthorized attacker can exploit this SSRF vulnerability remotely over a network without prior access, enabling privilege elevation on the affected Azure Compute Gallery component.
The Microsoft Security Response Center advisory provides guidance on mitigation and patches at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503.
Details
- CWE(s)