Cyber Posture

CVE-2025-59503

Critical

Published: 23 October 2025

Published
23 October 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0020 41.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59503 is a critical-severity SSRF (CWE-918) vulnerability in Microsoft Azure Compute Resource Provider. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SSRF by validating user-supplied inputs such as URLs and parameters before the server processes or issues requests on their behalf.

prevent

AC-4 enforces information flow control policies that restrict unauthorized server-side requests to internal or privileged resources exploited in this SSRF vulnerability.

preventdetect

SC-7 monitors and controls communications at boundaries, detecting and blocking anomalous outbound requests indicative of SSRF exploitation in Azure Compute Gallery.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

SSRF vulnerability in public-facing Azure Compute Gallery (T1190) directly enables remote exploitation without authentication, facilitating privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Server-side request forgery (ssrf) in Azure Compute Gallery allows an unauthorized attacker to elevate privileges over a network.

Deeper analysisAI

CVE-2025-59503 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting Azure Compute Gallery. Published on 2025-10-23T22:15:48.547, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its network accessibility, low complexity, lack of prerequisite privileges or user interaction, scope change, and high impacts across confidentiality, integrity, and availability.

An unauthorized attacker can exploit this SSRF vulnerability remotely over a network without prior access, enabling privilege elevation on the affected Azure Compute Gallery component.

The Microsoft Security Response Center advisory provides guidance on mitigation and patches at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503.

Details

CWE(s)

Affected Products

microsoft
azure compute resource provider
all versions

CVEs Like This One

CVE-2025-21177Same vendor: Microsoft
CVE-2026-32169Same vendor: Microsoft
CVE-2026-26138Same vendor: Microsoft
CVE-2026-26137Same vendor: Microsoft
CVE-2026-32186Same vendor: Microsoft
CVE-2026-26150Same vendor: Microsoft
CVE-2025-62207Same vendor: Microsoft
CVE-2026-33107Same vendor: Microsoft
CVE-2025-21385Same vendor: Microsoft
CVE-2026-32210Same vendor: Microsoft

References