CVE-2025-65037
Published: 18 December 2025
Summary
CVE-2025-65037 is a critical-severity Code Injection (CWE-94) vulnerability in Microsoft Azure Container Apps. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents code injection vulnerabilities like CVE-2025-65037 by validating and sanitizing all inputs at entry points to block malicious code execution.
Requires timely identification, reporting, and correction of flaws such as the code injection in Azure Container Apps through patching and updates.
Verifies the integrity of software and information in Azure Container Apps to detect and prevent unauthorized code execution resulting from injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a critical code injection flaw in the public-facing Azure Container Apps service, enabling unauthorized remote code execution without privileges, directly mapping to T1190: Exploit Public-Facing Application.
NVD Description
Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-65037, published on 2025-12-18, is an improper control of code generation vulnerability classified as code injection (CWE-94) affecting Azure Container Apps. This flaw enables an unauthorized attacker to execute code over a network, earning a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), reflecting its critical severity due to network accessibility, low attack complexity, and comprehensive impacts across confidentiality, integrity, and availability with scope expansion.
The vulnerability can be exploited by any unauthorized attacker with network access to the affected Azure Container Apps environment, requiring no privileges, user interaction, or special conditions. Successful exploitation allows remote code execution, potentially granting full control over the containerized applications, enabling data exfiltration, modification, or disruption.
Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65037.
Details
- CWE(s)