CVE-2025-64672: Microsoft SharePoint Server Spoofing Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Dec
Released
2025-12-09
EPSS Score
0.07% (percentile: 22.5%)

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.

FAQ

According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.

Affected Products (1)

Microsoft Office

  • Microsoft SharePoint Server Subscription Edition

Security Updates (1)

Acknowledgments

José Pedro Pereira Junior; https://www.linkedin.com/in/jose-pedro-pereira-jr/

Revision History

  • 2025-12-09: Information published.