Cyber Posture

CVE-2025-59228

High

Published: 14 October 2025

Published
14 October 2025
Modified
28 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-59228 is an improper input validation vulnerability affecting Microsoft Office SharePoint. Published on 2025-10-14T17:16:03.747, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-20 (Improper Input Validation), with additional NVD-CWE-noinfo classification.

An authorized attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation enables arbitrary code execution in the context of the SharePoint service, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) without scope change (S:U).

Microsoft's advisory provides guidance on this vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228.

Details

CWE(s)
CWE-20NVD-CWE-noinfo

Affected Products

microsoft
sharepoint server
2016, 2019 · ≤ 16.0.19127.20262

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE enables remote code execution via improper input validation in Microsoft Office SharePoint, a public-facing web application, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References