CVE-2026-26105
Published: 10 March 2026
Summary
CVE-2026-26105 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Microsoft Sharepoint Server. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-15 (Information Output Filtering) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific XSS flaw in SharePoint via patching to prevent unauthorized script injection and spoofing.
Filters information output during web page generation to neutralize untrusted input and block XSS payload execution in user browsers.
Validates inputs to SharePoint web interfaces to reject or sanitize malicious payloads before they are processed into web pages.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in public-facing SharePoint directly enables T1190 exploitation; injected scripts facilitate T1185 browser session hijacking, T1539 web session cookie theft, and T1056.003 web portal input capture for credential/data theft.
NVD Description
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
Deeper analysisAI
CVE-2026-26105 is a cross-site scripting (XSS) vulnerability, classified under CWE-79 for improper neutralization of input during web page generation, affecting Microsoft Office SharePoint. Published on March 10, 2026, it enables an unauthorized attacker to perform spoofing attacks over a network. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), reflecting its high severity due to network accessibility, low attack complexity, lack of required privileges, and potential for significant confidentiality and integrity impacts without affecting availability.
The attack requires user interaction, allowing an unauthorized remote attacker to exploit it by delivering malicious payloads through SharePoint-generated web pages. A victim user, such as an authenticated SharePoint user, must perform an action like clicking a link or viewing crafted content, enabling the injected script to execute in their browser context. This can result in spoofing, such as impersonating legitimate interfaces to steal session cookies, credentials, or sensitive data, or to manipulate page content for further phishing or data exfiltration.
Microsoft's Security Update Guide provides details on the vulnerability, including patch information and mitigation recommendations, at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26105. Security practitioners should review this advisory promptly to deploy updates and apply any interim workarounds to protect SharePoint environments.
Details
- CWE(s)