Cyber Posture

CVE-2025-65037

Critical

Published: 18 December 2025

Published
18 December 2025
Modified
15 January 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0010 28.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents code injection vulnerabilities like CVE-2025-65037 by validating and sanitizing all inputs at entry points to block malicious code execution.

preventrecover

Requires timely identification, reporting, and correction of flaws such as the code injection in Azure Container Apps through patching and updates.

preventdetect

Verifies the integrity of software and information in Azure Container Apps to detect and prevent unauthorized code execution resulting from injection.

Security SummaryAI

CVE-2025-65037, published on 2025-12-18, is an improper control of code generation vulnerability classified as code injection (CWE-94) affecting Azure Container Apps. This flaw enables an unauthorized attacker to execute code over a network, earning a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), reflecting its critical severity due to network accessibility, low attack complexity, and comprehensive impacts across confidentiality, integrity, and availability with scope expansion.

The vulnerability can be exploited by any unauthorized attacker with network access to the affected Azure Container Apps environment, requiring no privileges, user interaction, or special conditions. Successful exploitation allows remote code execution, potentially granting full control over the containerized applications, enabling data exfiltration, modification, or disruption.

Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65037.

Details

CWE(s)

Affected Products

microsoft
azure container apps
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical code injection flaw in the public-facing Azure Container Apps service, enabling unauthorized remote code execution without privileges, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References