Microsoft SharePoint flaw exploited, patch available

A medium-severity vulnerability in Microsoft SharePoint is being actively exploited, allowing attackers to spoof content.

Microsoft SharePoint flaw exploited, patch available

Image: cybersecuritydive.com

Security researchers are warning that a medium-severity vulnerability in Microsoft SharePoint is being actively exploited in the wild. The flaw, tracked as CVE-2026-32201, is a spoofing vulnerability that arises from improper input validation within the platform.

According to Microsoft's security advisory, an unauthenticated attacker could exploit this vulnerability by tricking a user into clicking a specially crafted link. Successful exploitation would allow the attacker to conduct a spoofing attack, potentially leading users to believe they are interacting with a legitimate SharePoint site when they are not.

Microsoft has released security updates to address this vulnerability. The company rates the flaw as "Important" in severity, not "Critical," but emphasizes that exploitation has been detected. The updates are included in the April 2026 Patch Tuesday releases for affected versions of SharePoint Server.

Administrators are urged to apply the relevant patches immediately. Microsoft also recommends reviewing the security advisory for specific update guidance based on the installed version of SharePoint Server.

❓ Frequently Asked Questions

What is CVE-2026-32201?

CVE-2026-32201 is a medium-severity spoofing vulnerability in Microsoft SharePoint caused by improper input validation, allowing attackers to trick users.

Has this SharePoint flaw been exploited?

Yes, Microsoft has confirmed that exploitation of CVE-2026-32201 has been detected in the wild.

Is there a patch available?

Yes, Microsoft released security updates to address this vulnerability as part of its April 2026 Patch Tuesday releases.

πŸ“° Source:
cybersecuritydive.com β†’
Share: