CVE-2025-24989 Microsoft Power Pages Improper Access Control

Read more about “CVE-2025-24989 Microsoft Power Pages Improper Access Control” and the most important cybersecurity news to stay up to date with

CVE-2025-24989 is a critical security vulnerability identified in Microsoft Power Pages, a low-code platform for creating and managing business websites. This flaw involves improper access control, allowing unauthorized attackers to elevate privileges over a network by bypassing user registration controls. The vulnerability has been actively exploited in the wild, prompting immediate attention from security professionals.

What is Vulnerable to CVE-2025-24989

The vulnerability specifically affects Microsoft Power Pages. Organizations utilizing this platform to build and host business websites are at risk. The flaw enables attackers to bypass user registration mechanisms, granting them unauthorized access to sensitive content and administrative functions. Microsoft has stated that the issue has been mitigated in the service, and all affected customers have been notified. If you have not received a notification, your environment is likely not affected.

Mitigation and Remediation for CVE-2025-24989

Microsoft has addressed the vulnerability by implementing a fix that corrects the registration control bypass. Affected customers have been provided with instructions to review their sites for potential exploitation and to apply necessary cleanup methods. Organizations using Power Pages should:

  • Verify Notifications: Check for any communications from Microsoft regarding this vulnerability. If notified, follow the provided instructions promptly.

  • Review Site Access Logs: Examine access logs for any unauthorized activities or anomalies that may indicate exploitation.

  • Apply Security Updates: Ensure that all security updates and patches provided by Microsoft are applied to your Power Pages environment.

  • Enhance Access Controls: Reevaluate and strengthen user registration and authentication mechanisms to prevent unauthorized access.

For detailed guidance, refer to Microsoft’s official advisory.

Impact of Successful Exploitation of CVE-2025-24989

Exploitation of this vulnerability can have severe consequences, including:

  • Unauthorized Access: Attackers may gain elevated privileges, allowing them to access sensitive data and administrative features.

  • Data Exfiltration: Compromised systems could lead to the theft of confidential information.

  • Service Disruption: Malicious actors might alter or disrupt website functionality, affecting business operations.

  • Regulatory Non-Compliance: Breaches resulting from this vulnerability could lead to non-compliance with data protection regulations, potentially resulting in legal penalties.

Given the active exploitation of this flaw, immediate remediation is crucial to safeguard organizational assets.

Proof of Concept for CVE-2025-24989

As of now, specific proof-of-concept (PoC) details for CVE-2025-24989 have not been publicly disclosed. This is likely a deliberate measure to prevent further exploitation by malicious actors. Security researchers and organizations are advised to monitor official channels and trusted cybersecurity sources for any future updates or releases related to this vulnerability.

In summary, CVE-2025-24989 represents a significant security risk for users of Microsoft Power Pages. Organizations should act promptly to implement the recommended mitigations and ensure their systems are protected against potential exploitation.


Subscribe to WNE Security’s newsletter for the latest cybersecurity best practices, 0-days, and breaking news. Or learn more about “CVE-2025-24989 Microsoft Power Pages Improper Access Control”