Description
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
Published: 2026-04-14
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Spoofing via cross‑site scripting
Action: Patch
AI Analysis

Impact

The vulnerability is an improper neutralization of input during web page generation in Microsoft SharePoint, classified as cross‑site scripting. An attacker with authorized access can submit content that is rendered on a page without adequate encoding, allowing the attacker to insert malicious or misleading content. The primary impact is that the page can be visually altered to imitate legitimate elements, resulting in spoofing of the SharePoint interface and deception of users.

Affected Systems

Affected systems include Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, and Microsoft SharePoint Server Subscription Edition. The CVE entry does not specify a particular affected version, so all current releases of these products are considered vulnerable until a patch is installed.

Risk and Exploitability

The CVSS score of 4.6 indicates moderate risk, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated and able to submit input that is incorporated into a page. Because it is cross‑site scripting, the attack likely occurs within the context of a legitimate user session, making it less likely to be discovered by automated scanners. The overall risk is moderate, and prompt patching is recommended to eliminate the spoofing risk.

Generated by OpenCVE AI on April 14, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official security update for Microsoft SharePoint Server 2016, 2019, and Subscription Edition via the Microsoft Security Update Guide or Windows Update.
  • Restrict the ability to input unvalidated content into SharePoint pages by enforcing proper encoding of user‑supplied data.
  • Monitor user activity logs for signs of unauthorized page modifications or spoofing attempts.

Generated by OpenCVE AI on April 14, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft sharepoint Enterprise Server 2016
Microsoft sharepoint Server Subscription Edition
Vendors & Products Microsoft sharepoint Enterprise Server 2016
Microsoft sharepoint Server Subscription Edition

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
Title Microsoft SharePoint Server Spoofing Vulnerability
First Time appeared Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
Weaknesses CWE-79
CPEs cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Sharepoint Enterprise Server 2016 Sharepoint Server Sharepoint Server 2016 Sharepoint Server 2019 Sharepoint Server Subscription Edition
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-17T16:11:50.521Z

Reserved: 2025-12-04T20:04:16.339Z

Link: CVE-2026-20945

cve-icon Vulnrichment

Updated: 2026-04-14T19:03:48.052Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T18:16:43.737

Modified: 2026-04-17T15:10:35.607

Link: CVE-2026-20945

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:15:06Z

Weaknesses