Microsoft addressed a critical vulnerability in its Power Pages platform, a low-code service used for creating and managing business websites. The flaw, tracked as CVE-2025-24989, was found to be an improper access control issue that could allow an attacker to bypass the user registration controls and escalate privileges over a network. This vulnerability posed a significant risk, as it could potentially give unauthorized users access to higher privileges within the platform, which could lead to further exploitation or data breaches.
In response to the discovery, Microsoft released a patch to fix the issue and mitigate the risk of exploitation. The company stated that customers do not need to manually install patches, as the vulnerability has already been addressed in the service. However, Microsoft did advise users to review their instances for any signs of compromise.
For those affected, Microsoft has provided instructions on how to investigate their sites for potential exploitation and steps to clean up any incidents of abuse.
While Microsoft has confirmed that the vulnerability has been patched, they have not provided specific details about any attacks involving the exploitation of CVE-2025-24989. The tech giant emphasized that customers who have not been notified about the issue are not impacted by the flaw. The company’s advisory included reassurance that the vulnerability was fully mitigated and that proactive measures were taken to secure all affected accounts and instances.
The incident highlights the ongoing risks associated with vulnerabilities in widely used platforms and the need for constant vigilance in securing SaaS services. While Microsoft has taken swift action to patch the vulnerability, organizations using Power Pages should remain vigilant and follow the provided guidance to ensure their instances are secure. This also serves as a reminder of the importance of regularly reviewing and updating security measures for cloud-based services to prevent similar issues in the future.