Latest
Vulnerabilities

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Microsoft has released its most recent Patch Tuesday updates addressing 165 vulnerabilities, which includes a SharePoint zero-day that has been actively exploited.

The SharePoint Server vulnerability in question is identified as CVE-2026-32201 and is categorized as a spoofing issue.

Microsoft has rated it as having an ‘important’ severity level, assigning it a CVSS score of 6.5.

According to Microsoft, “Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network,” indicating that an attacker could potentially exploit this vulnerability to gain access to sensitive data and modify it.

As of now, it remains uncertain who is responsible for the zero-day attacks related to CVE-2026-32201 and what their intentions may be. There is currently no publicly available information, and Microsoft has not disclosed the identity of the individual or entity that reported this security vulnerability.

However, given the vendor’s concise description, it is plausible that CVE-2026-32201 might be combined with other vulnerabilities.

Historically, SharePoint vulnerabilities have been frequently targeted. The CISA’s Known Exploited Vulnerabilities (KEV) catalog lists 10 SharePoint vulnerabilities as of now.

CVE-2026-32201 has been included in CISA’s KEV list, with federal agencies instructed to implement patches by April 28.

Among the other vulnerabilities that Microsoft addressed in its April 2026 Patch Tuesday updates, 19 have been rated with an exploitability level of ‘exploitation more likely’, suggesting that they may be targeted in future attacks.

One notable vulnerability is CVE-2026-33825, which pertains to a privilege escalation issue in Microsoft Defender that the company acknowledges was disclosed publicly prior to the release of patches.

Security vulnerabilities within Windows components such as Boot Loader, Active Directory, Remote Desktop, Hello, Storage Space Controllers, Search, TDI Translation Driver, BitLocker, Management Console, TCP/IP, Common Log File System Driver, UPnP Device Host, COM, Shell, Function Discovery Service, and Desktop Window Manager are also at an increased risk of being exploited in the future.

Satnam Narang, a senior staff research engineer at Tenable, noted that this is the second-largest Patch Tuesday update ever, just slightly below the record set in October 2025.

In a related note, Adobe has addressed over 50 vulnerabilities across 11 products in its latest round of Patch Tuesday updates.

More in Vulnerabilities & Patches

30-Year-Old Vulnerability Discovered in libpng Library
Vulnerabilities

30-Year-Old Vulnerability Discovered in libpng Library

Apr 16, 2026 3 min read
10 Persistent Software Bugs That Took Ages to Fix
Vulnerabilities

10 Persistent Software Bugs That Took Ages to Fix

Apr 15, 2026 9 min read
Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers
Vulnerabilities

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Apr 14, 2026 3 min read
Active Attacks Exploit Critical BeyondTrust RS Vulnerability
Vulnerabilities

Active Attacks Exploit Critical BeyondTrust RS Vulnerability

Apr 6, 2026 2 min read