CVE-2025-59245

Microsoft · Microsoft SharePoint Online Elevation of Privilege Multiple Products

A critical vulnerability has been discovered in Microsoft SharePoint Online, identified as CVE-2025-59245.

Executive summary

A critical vulnerability has been discovered in Microsoft SharePoint Online, identified as CVE-2025-59245. This flaw allows an attacker to elevate their privileges, potentially gaining administrative control over the SharePoint environment, which could lead to unauthorized access, modification, or theft of sensitive corporate data. Due to its critical severity rating, immediate attention and verification of remediation are required to protect organizational assets.

Vulnerability

This elevation of privilege vulnerability exists within the API handling user permissions in Microsoft SharePoint Online. A low-privileged, authenticated attacker can exploit this flaw by crafting a specialized web request to a specific SharePoint API endpoint. The vulnerability fails to properly validate the user's existing permissions before processing the request, allowing the attacker to grant themselves higher-level privileges, such as Site Collection Administrator or even Tenant Administrator, without authorization.

Business impact

The business impact of this vulnerability is critical, reflected by its CVSS score of 9.8. Successful exploitation could grant an attacker complete control over the organization's SharePoint environment. This would lead to a severe data breach, allowing the attacker to access, exfiltrate, modify, or delete all sensitive documents, intellectual property, and PII stored within SharePoint. Such an incident could result in significant financial loss, severe reputational damage, regulatory fines, and a complete loss of data integrity and confidentiality.

Remediation

Immediate Action: As SharePoint Online is a cloud service, Microsoft is responsible for applying the patch to the underlying infrastructure. Organizations must confirm that their tenant has received the necessary update. Additionally, security teams should immediately begin monitoring for any signs of exploitation attempts by closely reviewing SharePoint and Azure AD audit logs for unusual permission changes or administrative activities.

Proactive Monitoring: Monitor for suspicious activity in Microsoft 365 Unified Audit Logs, specifically focusing on unexpected privilege escalations (e.g., a user being added to an administrative group), creation of new administrative accounts, or unusual access patterns to sensitive SharePoint sites. Scrutinize API traffic for malformed requests and monitor for anomalous data download volumes that could indicate data exfiltration.

Compensating Controls: If the patch status cannot be immediately verified, implement compensating controls. Enforce strict Conditional Access policies to limit access based on user, location, and device health. Enforce Multi-Factor Authentication (MFA) for all users, especially administrators. Implement the principle of least privilege by auditing and reducing the number of accounts with high-level administrative rights.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical risk to the organization. Given the CVSS score of 9.8, immediate action is paramount. We recommend that the security team contact Microsoft support to verify that the patch for CVE-2025-59245 has been deployed to the organization's tenant. Concurrently, implement the proactive monitoring and compensating controls outlined above to detect potential exploitation and limit the blast radius of a successful attack. Although not currently on the CISA KEV list, the severity warrants treating this as an actively targeted vulnerability.