
Microsoft has disclosed a critical security vulnerability in Power Pages, which has been actively exploited as a zero-day attack. The vulnerability (CVE-2025-24989) represents a high-severity elevation of privilege flaw that enables unauthorized network access and bypasses user registration controls.
Impact and Scope
– Affects Microsoft Power Pages, a SaaS-based web development platform
– Enables privilege elevation and registration control bypass
– Exploitable remotely due to cloud-based nature
Microsoft’s Response
– Vulnerability has been patched at service level
– Affected customers have received direct notifications
– Detailed guidance provided for compromise detection
– Non-notified customers are confirmed unaffected
Recommended Security Measures
1. Review system activity logs for suspicious behavior
2. Audit user registrations and administrative changes
3. Verify administrator and privileged user accounts
4. Examine recent security role modifications
5. Monitor web page access control changes
Security Best Practices
– Revoke suspicious or unauthorized accounts
– Reset compromised credentials
– Implement multi-factor authentication (MFA)
– Maintain regular security audits
The vulnerability has been successfully addressed, but affected organizations should remain vigilant and follow Microsoft’s specific guidance for detecting potential exploitation.