7 CVE-2025-26633

CISA Kev Catalog RCE Injection SQL Exploit
 

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
https://nvd.nist.gov/vuln/detail/CVE-2025-26633

Categories

CWE-707 : Improper Neutralization
The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.

CWE-NVD-noinfo

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* < 10.0.10240.20947
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* < 10.0.10240.20947
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* < 10.0.14393.7876
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* < 10.0.14393.7876
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* < 10.0.17763.7009
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* < 10.0.17763.7009
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* < 10.0.19044.5608
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* < 10.0.19044.5608
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* < 10.0.19044.5608
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* < 10.0.19045.5608
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* < 10.0.19045.5608
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* < 10.0.19045.5608
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* < 10.0.22621.5039
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* < 10.0.22621.5039
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* < 10.0.22631.5039
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* < 10.0.22631.5039
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* < 10.0.26100.3403
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* < 10.0.26100.3403
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* < 10.0.20348.3270
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:* < 10.0.25398.1486
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:* < 10.0.26100.3403


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass...
https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
250 XML Injection
276 Inter-component Protocol Manipulation
277 Data Interchange Protocol Manipulation
278 Web Services Protocol Manipulation
279 SOAP Manipulation
High
3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Medium
43 Exploiting Multiple Input Interpretation Layers
High
468 Generic Cross-Browser Cross-Domain Theft
Medium
52 Embedding NULL Bytes
High
53 Postfix, Null Terminate, and Backslash
High
64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
High
7 Blind SQL Injection
High
78 Using Escaped Slashes in Alternate Encoding
High
79 Using Slashes in Alternate Encoding
High
83 XPath Injection
High
84 XQuery Injection
Very High