More than 1,300 publicly accessible Microsoft SharePoint servers remain vulnerable to a critical spoofing security flaw that is already being actively exploited by threat actors.
Although Microsoft released important security updates as part of Patch Tuesday, practical implementation across organizations is dangerously lagging behind, according to Bleeping Computer. The vulnerability, tracked as CVE-2026-32201, allows attackers to carry out extensive manipulation within a network without requiring prior privileges or any user interaction. This situation once again highlights the dangerous gap between the availability of technical fixes and their actual adoption within the digital infrastructure of large enterprises and government agencies.
SharePoint Server Subscription Edition also affected
The technical core of the vulnerability lies in a flawed validation of input data within the SharePoint architecture. Not only older versions such as SharePoint Enterprise Server 2016 and SharePoint Server 2019 are affected, but also the modern SharePoint Server Subscription Edition, which is based on a continuous update model. Since the exploit is rated as “Low Complexity,” the barrier for potential attackers is extremely low. A successful attack allows perpetrators to compromise the integrity and confidentiality of information within the SharePoint environment, meaning hackers can view or even manipulate sensitive data. In collaborative enterprise settings, this can have devastating consequences for decision-making processes and data security.
Microsoft’s classification of this flaw as a zero-day vulnerability underscores the severity of the incident, as it was already known and actively exploited before an official fix existed. So far, the software giant has remained tight-lipped regarding the details of observed attacks or the identity of the hacker groups involved. This information gap is currently being filled by the internet security watchdog Shadowserver, which published tracking data showing that fewer than 200 systems worldwide have been secured since the patches were released a week ago, while over 1,300 servers remain visibly vulnerable on the public internet. This points to a dangerous inertia in patch management that must be considered grossly negligent given the current threat landscape.
A classic entry point for complex cyberattacks
Alongside warnings from security researchers, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also responded, adding CVE-2026-32201 to its Known Exploited Vulnerabilities catalog. This measure goes far beyond a mere recommendation: for civilian federal agencies in the United States, addressing this vulnerability is now legally mandatory by April 28, 2026. CISA strongly warns that spoofing vulnerabilities of this kind represent a classic entry point for more complex cyberattacks and pose a risk to the entire federal digital ecosystem. Should immediate patch installation not be possible, the agency even advises taking affected products temporarily offline in extreme cases to avoid incalculable risks.
The current threat posed by SharePoint exploits exists within a broader context of ongoing security incidents. Just last week, CISA reported a privilege escalation vulnerability in the Windows Task Host that allowed attackers to gain SYSTEM-level privileges on infected devices. The overall picture of the April 14 Patch Tuesday, during which Microsoft closed a total of 167 security vulnerabilities, reveals a concerning density of critical flaws. Organizations that rely on SharePoint as a central platform for document management and teamwork must understand that spoofing attacks are often only the first step in a much larger attack chain. By manipulating displayed information, attackers can trick employees into taking further risky actions or undermine internal approval processes.
Act quickly and implement Microsoft’s security updates
The complexity of SharePoint farms often means that patches must be tested and applied manually, consuming time that simply does not exist in the case of an active zero-day exploit. The gap between the 1,300 exposed servers and the few systems that have been successfully patched sends a clear signal to attackers that defensive lines are full of holes. The focus must therefore be on shortening response times in order to safeguard the integrity of corporate infrastructure in the long term.
In summary, CVE-2026-32201 represents a serious vulnerability. The combination of low complexity, no required user interaction, and ongoing active exploitation makes it a top priority for every IT department. Administrators should immediately verify whether their SharePoint instances are affected and implement the security updates provided by Microsoft without further delay. The protection of corporate data and the preservation of trust in internal communication platforms depend on how quickly technical warnings are translated into practical protective measures.