Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
History

Thu, 23 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Microsoft windows 10
Microsoft windows 11
Microsoft windows Server
Microsoft windows Server 2008
Microsoft windows Server 2012
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Vendors & Products Microsoft
Microsoft windows
Microsoft windows 10
Microsoft windows 11
Microsoft windows Server
Microsoft windows Server 2008
Microsoft windows Server 2012
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025

Tue, 14 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Description Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Title Microsoft Windows File Explorer Spoofing Vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2025-10-14T17:01:25.051Z

Updated: 2025-10-24T23:08:25.051Z

Reserved: 2025-09-03T20:46:29.258Z

Link: CVE-2025-58739

cve-icon Vulnrichment

Updated: 2025-10-14T19:18:32.393Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T17:15:56.480

Modified: 2025-10-14T19:35:56.913

Link: CVE-2025-58739

cve-icon Redhat

No data.