Applies To
SharePoint Server 2019

Summary

Important: 

  • If you're currently running SharePoint Workflow Manager, you must install the August 2025 update for SharePoint Workflow Manager to your farm before you install this cumulative update.

  • If you're currently running the SharePoint 2013 Workflow, you have to enable the debug flag in order to continue using it.​​​​​​​$farm = Get-SPFarm

    $farm.ServerDebugFlags.Add(53601)

    $farm.update()

    iisreset

This security update resolves a Microsoft SharePoint Remote Code Execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2025-62204.

Notes: 

  • This is build 16.0.10417.20068 of the security update package.

  • To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.

Improvements and fixes

This security update contains improvements and fixes for the following nonsecurity issue in SharePoint Server 2019. 

  • This update fixes the GB18030-2022 China certificate issue.

  • This update requires users to specify the library for storing the audit logs before they proceed.

Known issues in this update

Users may see “4gab5" event tags logged in the SharePoint Unified Logging System (ULS) logs when they access sitedirectorysettings.aspx by using ‘set other host’. This issue occurs because of the enhanced security that restricts access to sitedirectorysettings.aspx to the current farm host.

To work around this issue, the farm administrator can add the new domain to the AdditionalValidSPFarmHosts in the farm by running the following PowerShell commands:

add-pssnapin *

$f = get-spfarm

$f.AddGenericAllowedListValue("AdditionalValidSPFarmHosts", "your_additional_farm_host")

$f.update()

iisreset

Note: Make sure that the setting host is safe before you follow the instructions to add the new domain.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Deployments - Security Update Guide.

Security update replacement information

This security update replaces previously released security update 5002796.

File hash information

File name

SHA256 hash

sts2019-kb5002803-fullfile-x64-glb.exe

65FB73E470909CCB80FF49AC4C2BF9E86BE747872108B9A0A88DD25E49A80E3A

File information

Download the list of files that are included in security update 5002803.

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.