DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-32176: CVE-2026-32176: Elevation of Privilege via SQL Injection in Microsoft SQL Server

CVE-2026-32176: Elevation of Privilege via SQL Injection in Microsoft SQL Server

Vulnerability ID: CVE-2026-32176
CVSS Score: 6.7
Published: 2026-04-14

CVE-2026-32176 is an elevation of privilege vulnerability in the Microsoft SQL Server engine caused by improper neutralization of special elements in dynamic SQL commands. An attacker with existing high-level privileges can exploit this flaw to execute arbitrary SQL commands within an elevated context, leading to full instance takeover.

TL;DR

An authenticated, high-privileged database user can exploit an internal SQL injection flaw in SQL Server system procedures to escalate their permissions to the sysadmin level, compromising the entire database instance.


Technical Details

  • CWE ID: CWE-89 (Improper Neutralization of Special Elements used in an SQL Command)
  • Attack Vector: Local (AV:L) / Authenticated Database Connection
  • Privileges Required: High (e.g., db_owner)
  • CVSS v3.1 Score: 6.7 (Medium)
  • Impact: Local Elevation of Privilege to sysadmin
  • EPSS Score: 0.00072 (21.99th percentile)
  • Exploit Status: None / Private
  • CISA KEV: Not Listed

Affected Systems

  • Microsoft SQL Server 2025
  • Microsoft SQL Server 2022
  • Microsoft SQL Server 2019
  • Microsoft SQL Server 2017
  • Microsoft SQL Server 2016
  • SQL Server 2025: < 17.0.1110.1 (GDR) (Fixed in: 17.0.1110.1)
  • SQL Server 2022: < 16.0.1175.1 (GDR) (Fixed in: 16.0.1175.1)
  • SQL Server 2019: < 15.0.2165.1 (GDR) (Fixed in: 15.0.2165.1)
  • SQL Server 2017: < 14.0.2105.1 (GDR) (Fixed in: 14.0.2105.1)
  • SQL Server 2016: < 13.0.6485.1 (GDR) (Fixed in: 13.0.6485.1)

Mitigation Strategies

  • Apply the official Microsoft GDR or CU updates provided in the April 2026 Patch Tuesday release.
  • Enforce the Principle of Least Privilege by minimizing the number of users in the db_owner role.
  • Disable the PolyBase feature using sp_configure if it is not actively utilized in the environment.
  • Enable and monitor SQL Server Audit logs for anomalous executions of system stored procedures.

Remediation Steps:

  1. Identify the exact version and edition of the target SQL Server instances.
  2. Download the appropriate KB update (e.g., KB5084814 for SQL Server 2025) from the Microsoft Update Catalog.
  3. Schedule a maintenance window, as the SQL Server service will require a restart during the patching process.
  4. Apply the patch and verify the build number using 'SELECT @@version' to ensure the update was successful.
  5. Review user role assignments across all user databases to ensure non-administrative users do not possess unintended high privileges.

Read the full report for CVE-2026-32176 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)