Description
'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.
Published: 2025-12-18
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

The vulnerability allows an authorized attacker to execute arbitrary code by using a specially crafted payload that exploits a flaw in Microsoft Purview. This capability enables the attacker to run code on the Purview service, compromising confidentiality, integrity, and availability of the data stored and processed by the service. The weakness is identified as CWE-35 (XSS) and CWE-94 (Code Injection).

Affected Systems

Microsoft Purview is affected; no specific version information is provided, so all instances of Microsoft Purview that have not applied downstream security updates could be vulnerable.

Risk and Exploitability

The CVSS score of 7.2 indicates a moderate to high severity risk, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Because the attacker must be an authorized user of Purview, the threat is primarily an internal or privileged actor scenario; no publicly available exploit was reported in the CVE description.

Generated by OpenCVE AI on April 20, 2026 at 15:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available Microsoft Purview patch or update when it is released by Microsoft.
  • Restrict Purview user permissions, ensuring only roles that truly require elevated privileges can access the vulnerable functionality.
  • Continuously monitor Purview logs and network activity for suspicious code execution or abnormal API usage patterns.

Generated by OpenCVE AI on April 20, 2026 at 15:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-35

Tue, 06 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft purview
CPEs cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*
Vendors & Products Microsoft purview

Fri, 19 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Description '.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.
Title Microsoft Purview eDiscovery Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft office Purview
Weaknesses CWE-94
CPEs cpe:2.3:a:microsoft:office_purview:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft office Purview
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Office Purview Purview
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-16T14:19:05.887Z

Reserved: 2025-11-06T23:40:37.277Z

Link: CVE-2025-64676

cve-icon Vulnrichment

Updated: 2025-12-19T15:11:19.218Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T22:16:00.910

Modified: 2026-02-10T20:16:52.253

Link: CVE-2025-64676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:45:10Z

Weaknesses