CVE-2026-32176: Elevation of Privilege via SQL Injection in Microsoft SQL Server
Vulnerability ID: CVE-2026-32176
CVSS Score: 6.7
Published: 2026-04-14
CVE-2026-32176 is an elevation of privilege vulnerability in the Microsoft SQL Server engine caused by improper neutralization of special elements in dynamic SQL commands. An attacker with existing high-level privileges can exploit this flaw to execute arbitrary SQL commands within an elevated context, leading to full instance takeover.
TL;DR
An authenticated, high-privileged database user can exploit an internal SQL injection flaw in SQL Server system procedures to escalate their permissions to the sysadmin level, compromising the entire database instance.
Technical Details
- CWE ID: CWE-89 (Improper Neutralization of Special Elements used in an SQL Command)
- Attack Vector: Local (AV:L) / Authenticated Database Connection
- Privileges Required: High (e.g., db_owner)
- CVSS v3.1 Score: 6.7 (Medium)
- Impact: Local Elevation of Privilege to sysadmin
- EPSS Score: 0.00072 (21.99th percentile)
- Exploit Status: None / Private
- CISA KEV: Not Listed
Affected Systems
- Microsoft SQL Server 2025
- Microsoft SQL Server 2022
- Microsoft SQL Server 2019
- Microsoft SQL Server 2017
- Microsoft SQL Server 2016
-
SQL Server 2025: < 17.0.1110.1 (GDR) (Fixed in:
17.0.1110.1) -
SQL Server 2022: < 16.0.1175.1 (GDR) (Fixed in:
16.0.1175.1) -
SQL Server 2019: < 15.0.2165.1 (GDR) (Fixed in:
15.0.2165.1) -
SQL Server 2017: < 14.0.2105.1 (GDR) (Fixed in:
14.0.2105.1) -
SQL Server 2016: < 13.0.6485.1 (GDR) (Fixed in:
13.0.6485.1)
Mitigation Strategies
- Apply the official Microsoft GDR or CU updates provided in the April 2026 Patch Tuesday release.
- Enforce the Principle of Least Privilege by minimizing the number of users in the db_owner role.
- Disable the PolyBase feature using sp_configure if it is not actively utilized in the environment.
- Enable and monitor SQL Server Audit logs for anomalous executions of system stored procedures.
Remediation Steps:
- Identify the exact version and edition of the target SQL Server instances.
- Download the appropriate KB update (e.g., KB5084814 for SQL Server 2025) from the Microsoft Update Catalog.
- Schedule a maintenance window, as the SQL Server service will require a restart during the patching process.
- Apply the patch and verify the build number using 'SELECT @@version' to ensure the update was successful.
- Review user role assignments across all user databases to ensure non-administrative users do not possess unintended high privileges.
Read the full report for CVE-2026-32176 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)