Description
Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to disclose information over a network.
Published: 2026-01-13
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via Server‑Side Request Forgery
Action: Patch immediately
AI Analysis

Impact

The vulnerability is a server‑side request forgery that permits an attacker with valid credentials on Microsoft SharePoint to cause the server to initiate requests to arbitrary network locations, thereby disclosing internal or external information. The weakness, identified as CWE‑918, can lead to the unintended exposure of sensitive data over the network and compromise confidentiality but does not provide a pathway to remote code execution or system compromise.

Affected Systems

Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, and Microsoft SharePoint Server Subscription Edition are affected. No specific patch version details are listed in the input; the impact applies to all installations of these products as described.

Risk and Exploitability

The CVSS score of 5.4 reflects moderate potential risk, while an EPSS of less than 1% indicates that active exploitation attempts are rare at this time. The vulnerability is not cataloged in the CISA KEV list. Because the exploit requires authenticated access, an attacker would need to be authorized or have compromised user credentials. If successful, the attacker could redirect SharePoint’s outbound traffic to malicious hosts and siphon sensitive data, but the likelihood of exploitation remains low under current threat conditions.

Generated by OpenCVE AI on April 16, 2026 at 08:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent Microsoft security update for SharePoint that addresses CVE-2026-20958.
  • Configure network controls such as firewalls or proxy settings to restrict SharePoint’s outbound requests to only approved destinations, limiting the potential for SSRF exploitation.
  • Enforce strict role‑based access controls and review user privileges to ensure that only the minimum necessary accounts have SharePoint access, reducing the attack surface for authorized attackers.

Generated by OpenCVE AI on April 16, 2026 at 08:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to disclose information over a network.
Title Microsoft SharePoint Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
Weaknesses CWE-918
CPEs cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Sharepoint Server Sharepoint Server 2016 Sharepoint Server 2019
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:20.010Z

Reserved: 2025-12-04T20:04:16.340Z

Link: CVE-2026-20958

cve-icon Vulnrichment

Updated: 2026-01-13T18:32:07.589Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:23.790

Modified: 2026-01-14T19:21:51.797

Link: CVE-2026-20958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:15:29Z

Weaknesses