Description
Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management allows an unauthorized attacker to perform spoofing over a network.
Published: 2026-04-23
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery (SSRF) leading to network spoofing
Action: Immediate Patch
AI Analysis

Impact

Microsoft Entra ID Entitlement Management contains a server‑side request forgery flaw that permits an unauthorized attacker to direct the service to send requests to arbitrary internal endpoints. Based on the description, it is inferred that this could be used to spoof network traffic, causing the Entra ID server to invoke services or endpoints within the internal network without user interaction. The vulnerability is limited to the Entitlement Management functionality and requires no authentication to exploit.

Affected Systems

Microsoft Entra ID, specifically the Entitlement Management component. Because the advisory does not list particular build numbers or patch releases, all deployments using Entra ID are potentially impacted until Microsoft issues a fix. Administrators should verify the version they are operating but note that version specifics were not disclosed.

Risk and Exploitability

The CVSS score of 10.0 marks this as a critical vulnerability that can be exploited by an unauthorized attacker. The EPSS score of less than 1% indicates a low current exploitation probability, and it is not catalogued in CISA’s KEV list. Attackers can exploit the flaw by sending a crafted request to the Entitlement Management API, causing the Entra service to connect to arbitrary URLs on the internal network. No user interaction or authentication is required to bring the vulnerability to fruition.

Generated by OpenCVE AI on April 28, 2026 at 20:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft Entra ID security update as published by Microsoft.
  • Restrict access to the Entitlement Management API by allowing only trusted IP ranges or internal networks through firewall or network segmentation.
  • Disable or tightly restrict outbound connections from Entra ID servers to unknown destinations, using firewall rules or web application firewall policies to block unsolicited requests.
  • Monitor outbound network traffic from Entra ID for unexpected or suspicious connections and log all outbound requests for auditing.

Generated by OpenCVE AI on April 28, 2026 at 20:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:entra_id:-:*:*:*:*:*:*:*

Tue, 28 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft entra Id
Vendors & Products Microsoft entra Id

Fri, 24 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management allows an unauthorized attacker to perform spoofing over a network.
Title Microsoft Entra ID Entitlement Management Spoofing Vulnerability
First Time appeared Microsoft
Microsoft microsoft Entra Id
Weaknesses CWE-918
CPEs cpe:2.3:a:microsoft:microsoft_entra_id:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft microsoft Entra Id
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Entra Id Microsoft Entra Id
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T17:39:55.617Z

Reserved: 2026-04-02T19:21:11.804Z

Link: CVE-2026-35431

cve-icon Vulnrichment

Updated: 2026-04-24T14:55:09.684Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:38.510

Modified: 2026-04-28T12:10:53.103

Link: CVE-2026-35431

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:30:06Z

Weaknesses