Impact
The vulnerability is an improper input validation flaw that permits an attacker without authorization to execute arbitrary code locally on Microsoft SharePoint Server installations. The flaw could allow the execution of malicious scripts or binaries with the privileges of the SharePoint service process, potentially compromising the integrity and confidentiality of the affected system and the data stored within it.
Affected Systems
Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, and Microsoft SharePoint Server Subscription Edition are compromised when running unpatched versions. The vulnerability applies to all product releases identified by the Microsoft CNA that are listed in the known affected products.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while the EPSS score of less than 1% shows a very low probability of exploitation at the time of reporting. The vulnerability is not currently featured in the CISA KEV catalog. The attack vector is inferred to be remote, typically via malicious input sent over the network to SharePoint processes, because the flaw involves input validation in a web‑based component. A successful exploit would grant code execution rights to the attacker with the same privileges as the SharePoint service account.
OpenCVE Enrichment