CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Analysis
Microsoft Office SharePoint contains a code injection vulnerability (CVE-2025-49704, CVSS 8.8) enabling authenticated attackers to execute arbitrary code over the network. KEV-listed with EPSS 63.8%, this vulnerability requires only basic SharePoint authentication and enables server-level code execution, threatening the documents, workflows, and data stored across the organization's SharePoint infrastructure.
Technical Context
The vulnerability allows authenticated SharePoint users to inject code that executes on the server side. In SharePoint environments, this is particularly impactful because: most employees have SharePoint accounts (large attack surface), SharePoint servers often store highly sensitive documents, and the SharePoint service account typically has broad infrastructure access.
Affected Products
['Microsoft Office SharePoint (affected versions per advisory)']
Remediation
Apply Microsoft security update. Audit SharePoint service account permissions. Monitor for suspicious code execution on SharePoint servers. Review SharePoint access logs.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-20554