CVE-2025-24989

8.2 HIGH CISA KEV

📋 TL;DR

An improper access control vulnerability in Microsoft Power Pages allows unauthorized attackers to bypass user registration controls and elevate privileges over a network. This affects Power Pages customers who haven't applied the service update. Microsoft has already mitigated the vulnerability in their service and notified affected customers.

💻 Affected Systems

Products:
  • Microsoft Power Pages
Versions: Specific versions not disclosed - vulnerability was in the service
Operating Systems: Not applicable - cloud service
Default Config Vulnerable: ⚠️ Yes
Notes: This is a cloud service vulnerability that Microsoft has already mitigated. Only customers notified by Microsoft were affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to Power Pages sites, potentially compromising sensitive data, modifying site content, or using the platform as a foothold for further attacks.

🟠

Likely Case

Unauthorized users register accounts with elevated privileges, gaining access to restricted content or functionality they shouldn't have.

🟢

If Mitigated

Proper access controls prevent privilege escalation, maintaining normal user registration workflows and authorization boundaries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access and understanding of Power Pages registration controls. CISA has added this to their Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Service update already applied by Microsoft

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24989

Restart Required: No

Instructions:

1. Microsoft has already applied the fix to their service. 2. If you were notified as affected, follow Microsoft's instructions for reviewing sites and cleanup. 3. If you weren't notified, you're not affected.

🔧 Temporary Workarounds

Review and cleanup as instructed

all

Follow Microsoft's provided instructions to review Power Pages sites for exploitation and perform any necessary cleanup

🧯 If You Can't Patch

  • Monitor Power Pages sites for unauthorized user registrations or privilege changes
  • Implement additional authentication/authorization controls if possible

🔍 How to Verify

Check if Vulnerable:

Check if you received notification from Microsoft about this vulnerability. If not notified, you're not affected.

Check Version:

Not applicable - cloud service update

Verify Fix Applied:

Microsoft has already applied the fix to their service. Verify by checking that user registration controls are functioning as expected.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user registrations
  • Privilege escalation events
  • Unauthorized access attempts to restricted areas

Network Indicators:

  • Unusual registration traffic patterns
  • Authentication bypass attempts

SIEM Query:

Search for user registration events outside normal patterns or privilege changes in Power Pages audit logs

🔗 References

📤 Share & Export