Security

Cyber-crime

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites


Microsoft has fixed a security flaw in its Power Pages website-building SaaS, after criminals got there first – and urged users to check their sites for signs of exploitation.

Power Pages is part of Microsoft's low-code Power Platform suite and offers tools to create, host, and update business websites.

The newly patched flaw, CVE-2025-24989, technically speaking allows attackers to elevate privileges over a network, potentially bypassing the user registration control. In plainer English: Unauthorized miscreants could use the hole to log into sites using accounts they shouldn't have.

Power Pages is software-as-a-service, so Microsoft has closed the vulnerability at its end. The software giant has nonetheless sent affected customers instructions on how to review their sites for signs of potential exploitation, and procedures to clean up if needed.

The good news is that this problem doesn’t impact all Power Pages users. “If you've not been notified, this vulnerability does not affect you,” states Microsoft’s advisory.

Microsoft staffer Raj Kumar spotted the flaw, which was rated 8.2 out of 10 on the CVSS scale. Redmond warned that attackers had already taken advantage of the flaw before it implemented the fix.

Power Pages was introduced in 2022, and Microsoft claims it has over 250 million monthly active website users. One of them is Britain's National Health Service, which last year exposed data describing over a million of its staff due to misconfigured access controls in websites it built with Power Pages.

Asked for further comment on this latest update, a Microsoft spokesperson told us simply: "We released a fix and customers are protected."

Meanwhile, the Windows giant has patched a high severity flaw in its search engine Bing. The CVSS 8.6-rated issue - CVE-2025-21355 - would, again technically speaking, let an unauthenticated attacker execute code over a network due to missing authentication for a critical function.

There's no evidence of active exploitation, but proof-of-concept code is already out there, according to Microsoft. Once again, the software giant has pushed out a patch to fix the issue, and no action is required from customers. ®

Send us news
4 Comments

Under Trump 2.0, Europe's dependence on US clouds back under the spotlight

Technologist Bert Hubert tells The Reg Microsoft Outlook is a huge source of geopolitical risk

Microsoft unveils finalized EU Data Boundary as European doubt over US grows

Some may have second thoughts about going all-in with an American vendor, no matter where their data is stored

February's Patch Tuesday sees Microsoft offer just 63 fixes

Don't relax just yet: Redmond has made some certificate-handling changes that could trip unprepared admins

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Microsoft shows off novel quantum chip that can scale to 'a million qubits'. So far: Eight

Not just a matter of time but a matter of Majorana fermions, too

Microsoft's drawback on datacenter investment may signal AI demand concerns

Investment bank claims software giant ditched 'at least' 5 land parcels due to potential 'oversupply'

Ad-supported Microsoft Office bobs to the surface

Only a test at the moment, but a sign of things to come?

Microsoft trims more CPUs from Windows 11 compatibility list

OEMs blowing dust from the processor stock cupboard, beware

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Your days of driver sync via Windows Server Update Services are numbered

Microsoft suggests a move to the cloud

Windows 11 24H2 goes back to the drawing board over AutoCAD 2022 glitch

Safeguard hold applied after designer darling borked by problematic update

Euro cloud crew says we-won't-sue deal with Microsoft is 'off-track'

Overseas pals urge US tech giant to 'rapidly' work on Azure Local project to make things right – sans licenses