Critical vulnerability in Microsoft Power Pages puts your data at risk

Microsoft Power Pages, a platform for easy web application development, is facing a serious security flaw known as a zero-day vulnerability (CVE‑2025‑24989). This flaw allows attackers with no user permissions to escalate their privileges and bypass the usual user registration process. In other words, anyone unauthorized can break into the system and gain control, posing a significant security risk. This vulnerability has already been actively exploited, meaning it’s not just theoretical but a real and current threat.

How the Exploit Works: Bypassing User Registration

The vulnerability lies in improper access validation: an attacker can bypass user registration checks and then escalate their privileges—such as downloading sensitive data, modifying settings, or deploying a malicious web shell.

  • On February 20, 2025, Microsoft released a quick security bulletin announcing service-level patches and stating that affected customers were privately notified with recommended remediation steps.
  • CISA has added CVE‑2025‑24989 to the list of Known Exploited Vulnerabilities, requiring federal agencies to implement mitigation measures by March 14, 2025.
  • The vulnerability received a high CVSS score of 9.8, making it critical—it allows remote exploitation without user interaction.


CVE‑2025‑24989 is a unique identifier for a software security vulnerability. CVE stands for Common Vulnerabilities and Exposures—common security flaws that can threaten systems or applications. The number 2025 indicates the year the vulnerability was published, and the final part (24989) is the specific identifier for this vulnerability.

This designation helps experts precisely identify and address specific security issues, while also facilitating communication between software vendors, security teams, and users.

Other highlights