As part of the April 2026 Patch Tuesday cycle, Microsoft has addressed a zero-day spoofing vulnerability in Microsoft SharePoint Server, tracked as CVE-2026-32201. This vulnerability was actively exploited in the wild before a patch was available. The flaw enables an unauthenticated attacker to spoof their identity, allowing them to view protected information and modify content on a vulnerable SharePoint site. Due to its status as an actively exploited zero-day, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added it to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply the patch by April 28, 2026.
CVE-2026-32201 is a spoofing vulnerability that arises from improper input validation in Microsoft SharePoint Server. It has been assigned a CVSS score of 6.5, but its real-world impact is significantly higher due to its low attack complexity and lack of required user interaction.
An unauthenticated attacker can send a specially crafted network request to a vulnerable SharePoint server. This request tricks the server into treating the attacker as a legitimate, authenticated user, granting them the privileges of the spoofed identity. This allows the attacker to bypass access controls.
The vulnerability affects on-premises installations of Microsoft SharePoint Server. The specific versions are detailed in Microsoft's advisory for CVE-2026-32201. Cloud-based SharePoint Online is not affected. All organizations running internet-facing SharePoint servers are considered at high risk.
CVE-2026-32201 is confirmed to be actively exploited in the wild. Threat intelligence indicates that coordinated reconnaissance and exploitation attempts against internet-facing SharePoint servers began in the first half of April 2026, before the patch was released. The addition to the CISA KEV catalog further validates the widespread and active threat posed by this vulnerability.
Successful exploitation of CVE-2026-32201 has a direct impact on the confidentiality and integrity of data stored on the SharePoint server.
Given that SharePoint is often a central repository for corporate data, a vulnerability that allows an unauthenticated attacker to view and modify content is a critical risk that requires immediate attention.
The following patterns may help identify vulnerable or compromised systems:
/wsa.asmx or /wsb.asmx endpoints.D3-WSAA - Web Session Activity Analysis is a relevant defensive technique.M1051 - Update Software.Microsoft confirms patch release for actively exploited SharePoint zero-day CVE-2026-32201 as part of April Patch Tuesday, with 1,300 internet-exposed servers identified as vulnerable.
The primary and most effective mitigation is to apply the security patches provided by Microsoft immediately.
Mapped D3FEND Techniques:
As a compensating control, restrict access to internet-facing SharePoint servers to known, trusted IP ranges to reduce the attack surface.
Mapped D3FEND Techniques:
The most critical and immediate action for organizations running Microsoft SharePoint Server is to apply the security update that addresses CVE-2026-32201. Given that this is a zero-day vulnerability under active exploitation, patching should be treated as an emergency change. Priority must be given to all internet-facing SharePoint servers, as they are the most exposed. Patching is the only way to fully remediate the vulnerability. After applying the patch, it is crucial to verify that the update was installed successfully across all servers in the farm. This defensive measure directly closes the attack vector used by threat actors, making it the single most effective countermeasure.
As a compensating control and defense-in-depth measure, organizations should implement strict inbound traffic filtering for their SharePoint servers. If the server does not need to be accessible to the entire internet, restrict access at the network perimeter (firewall or WAF) to only known, trusted IP ranges of employees, partners, or customers. For publicly accessible portals, a Web Application Firewall (WAF) should be deployed in front of SharePoint. A WAF can be configured with rules to inspect incoming requests for anomalies and block malicious payloads, potentially providing a layer of 'virtual patching' against exploitation attempts of CVE-2026-32201 before the official patch can be applied. This reduces the attack surface and limits the pool of potential attackers.
Microsoft releases its April 2026 Patch Tuesday, including a fix for CVE-2026-32201, and notes it is under active exploitation.
CISA adds CVE-2026-32201 to its Known Exploited Vulnerabilities (KEV) catalog, setting a patching deadline of April 28, 2026 for federal agencies.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats