Description
Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.
Published: 2026-03-19
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

Microsoft Purview is vulnerable to a server‑side request forgery that can be exploited by an unauthorized attacker to elevate privileges over the network. This weakness, classified as CWE‑918, allows malicious input to be sent to the Purview service, enabling the attacker to perform actions normally restricted to higher‑privileged users. The effect is that an attacker could gain administrative control or reconfigure system settings, thereby compromising confidentiality, integrity, and availability of the Purview environment.

Affected Systems

The affected product is Microsoft Purview, including its Office Purview component. No specific product versions are listed in the data, so any deployment of Microsoft Purview could be vulnerable. Administrators should verify whether their installation was released on or after the date of the identified vulnerability.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity of the bug. The EPSS score of less than 1% suggests a low likelihood of immediate exploitation, and the vulnerability is not part of the CISA Known Exploited Vulnerabilities catalog. The most likely attack vector involves a malicious user or compromised system within the Purview network exploiting the SSRF mechanism to send crafted requests to vulnerable endpoints, thereby gaining elevated privileges. Overall the risk is moderate to high for organizations with exposure to the Purview service, especially if internal network access is insufficiently restricted.

Generated by OpenCVE AI on March 24, 2026 at 18:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security update for Microsoft Purview posted by Microsoft in the Security Response Center.

Generated by OpenCVE AI on March 24, 2026 at 18:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft purview
CPEs cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*
Vendors & Products Microsoft purview

Mon, 23 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.
Title Microsoft Purview Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft office Purview
Weaknesses CWE-918
CPEs cpe:2.3:a:microsoft:office_purview:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft office Purview
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C'}


Subscriptions

Microsoft Office Purview Purview
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-09T23:25:56.605Z

Reserved: 2026-02-11T16:24:51.134Z

Link: CVE-2026-26139

cve-icon Vulnrichment

Updated: 2026-03-21T03:30:03.794Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:08.377

Modified: 2026-03-24T17:14:00.070

Link: CVE-2026-26139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:52Z

Weaknesses