Description
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
Published: 2026-01-13
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Spoofing via XSS
Action: Apply Patch
AI Analysis

Impact

Improper neutralization of input during web page generation in Microsoft SharePoint enables cross‑site scripting that can cause a malicious site to appear authentic to users. The vulnerability allows an authorized attacker to inject content that is rendered as part of the SharePoint interface, enabling spoofing across the network. This can lead to users believing that an attacker’s content is coming from the legitimate SharePoint system, potentially enabling further deception or phishing attacks. The weakness is a classic cross‑site scripting flaw classified as CWE‑79.

Affected Systems

Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, and Microsoft SharePoint Server Subscription Edition are affected. No specific version details are listed beyond the product names, indicating that multiple releases within these product lines may be vulnerable.

Risk and Exploitability

The CVSS score of 4.6 classifies the severity as moderate, while the EPSS score of less than 1% suggests a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The attack requires an attacker to already possess authorized access to the SharePoint environment; there is no indication that a publicly exposed exploitation pathway exists. Therefore, insiders or compromised accounts are the primary threat vector, and the risk is amplified where privileged users can manipulate web content.

Generated by OpenCVE AI on April 16, 2026 at 18:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the Microsoft security update for SharePoint from the advisory link (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20959).
  • Limit page authoring permissions so that only trusted users can modify content that appears on public or shared sites.
  • Configure a Content Security Policy (CSP) and enable SharePoint’s built‑in script and input validation controls to mitigate injection of malicious HTML or JavaScript.

Generated by OpenCVE AI on April 16, 2026 at 18:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*

Tue, 13 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
Title Microsoft SharePoint Server Spoofing Vulnerability
First Time appeared Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
Weaknesses CWE-79
CPEs cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Sharepoint Server Sharepoint Server 2016 Sharepoint Server 2019
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:48:58.908Z

Reserved: 2025-12-04T20:04:16.340Z

Link: CVE-2026-20959

cve-icon Vulnrichment

Updated: 2026-01-13T21:42:27.414Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:23.937

Modified: 2026-01-14T19:19:39.877

Link: CVE-2026-20959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses