Microsoft warns SharePoint Server zero-day CVE-2026-32201 is under active attack
Microsoft has confirmed active exploitation of CVE-2026-32201, a SharePoint Server spoofing vulnerability affecting on-premises SharePoint deployments. The flaw carries a CVSS 3.1 base score of 6.5, which puts it in the medium range, but the confirmed attacks make it a high-priority patching issue for affected organizations.
The vulnerability affects SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016. Microsoft released security updates for all three products on April 14, 2026, and CISA added the bug to its Known Exploited Vulnerabilities catalog the same day.
Access content across the globe at the highest speed rate.
70% of our readers choose Private Internet Access
70% of our readers choose ExpressVPN
Browse the web from multiple devices with industry-standard security protocols.
Faster dedicated servers for specific actions (currently at summer discounts)
Microsoft describes the issue as an improper input validation flaw in Microsoft Office SharePoint that allows an unauthorized attacker to perform spoofing over a network. The company says successful exploitation could affect confidentiality and integrity, while availability impact remains unchanged.
Why this SharePoint bug matters now
This is not a case where defenders can wait for more details. Microsoft has already flagged the vulnerability as exploited in the wild, and CISA has given federal agencies until April 28, 2026, to apply mitigations or discontinue use if mitigations are unavailable.
That raises the urgency well above what the 6.5 score alone suggests. A network-exploitable SharePoint flaw with no privileges and no user interaction required creates a serious exposure for organizations running internet-facing or poorly segmented on-premises collaboration servers.
The sample article gets one important thing wrong in tone. It calls the flaw critical, but the official score Microsoft assigned is 6.5, not critical. The real reason this story matters is the confirmed exploitation, not the numeric severity label.
Affected SharePoint versions and patch details
Microsoft says the following SharePoint products received fixes on April 14:
| Product | Update | Build |
|---|---|---|
| SharePoint Server Subscription Edition | KB5002853 | 16.0.19725.20210 |
| SharePoint Server 2019 | KB5002854 | 16.0.10417.20114 |
| SharePoint Server 2016 | KB5002861 | 16.0.5548.1003 |
These April 14 updates are part of Microsoft’s broader Office and SharePoint security release for the month. Microsoft’s support pages also note that the fixes address CVE-2026-32201 along with CVE-2026-20945 in the affected SharePoint builds.
For SharePoint Server 2016, Microsoft also warns that customers running SharePoint Workflow Manager must install KB5002799 before applying the cumulative update. That note appears in Microsoft’s official guidance for KB5002861.
What defenders should do next
Organizations running on-premises SharePoint should patch these servers immediately. They should also review exposure from internet-facing instances, since SharePoint remains a common enterprise platform and often sits close to sensitive internal content and authentication flows.
Security teams should not stop at patching alone. Because Microsoft and CISA both confirm active exploitation, defenders should inspect logs and surrounding infrastructure for suspicious access patterns, spoofing-related activity, and any signs that attackers tried to abuse exposed SharePoint services before updates were applied.
CISA’s guidance is blunt. Agencies should apply mitigations per vendor instructions, follow existing binding guidance for cloud services where relevant, or discontinue use if mitigations are unavailable. Private sector defenders will likely treat that as a strong signal to move fast as well.
Immediate response checklist
- Patch SharePoint Server Subscription Edition, 2019, and 2016 with the April 14 security updates.
- Check whether any SharePoint instances are directly exposed to the internet.
- Review SharePoint and web server logs for suspicious remote activity.
- Inspect authentication events and access patterns for anomalies.
- Tighten segmentation and external access rules until patching is complete.
- For SharePoint 2016 environments using Workflow Manager, install KB5002799 first.
FAQ
It is a Microsoft SharePoint Server improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.
Yes. Microsoft marked it as exploited, and CISA added it to the Known Exploited Vulnerabilities catalog on April 14, 2026.
SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016.
No. Microsoft’s CVSS 3.1 base score is 6.5, which is medium. The urgent part is the in-the-wild exploitation, not a critical severity label.
KB5002853 for SharePoint Server Subscription Edition, KB5002854 for SharePoint Server 2019, and KB5002861 for SharePoint Server 2016.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages