Summary
Important:Â
-
If you're running 2013-type workflows, you mustinstall the August 2025 update for SharePoint Workflow Manager to your farm before you install this cumulative update.
-
If you're currently running the Classic version of Workflow Manager, you must enable the debug flag to continue using it.$farm = Get-SPFarm
$farm.ServerDebugFlags.Add(53601)
$farm.update()
iisreset
This security update resolves a Microsoft Excel Information Disclosure Vulnerability, Microsoft Word Remote Code Execution Vulnerability, and Microsoft SharePoint Remote Code Execution Vulnerability. To learn more about the vulnerabilities, see the following security advisories:
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59232
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59222
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59221
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59237
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59235
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-59228Â
Notes:Â
-
This is build 16.0.10417.20059 of the security update package.
-
To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.
Improvements and fixes
This security update contains improvements and fixes for the following nonsecurity issue in SharePoint Server 2019.Â
-
Enables the AMSI body scan over HTTP request.
Workaround
You might have to use the following workarounds if these situations apply to you.
-
To prevent all matching requests from being blocked, make sure that you configure the correct threshold settings.
-
If you experience a break in workflow functionality within Classic Workflow Manager, you can restore operations by running the following commands in the SharePoint Management Shell:$farm = Get-SPFarm$farm.ServerDebugFlags.Add(53601)$farm.update()iisreset
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More information
Security update deployment information
For deployment information about this update, see Deployments - Security Update Guide.
Security update replacement information
This security update replaces previously released security update 5002775.
File hash information
File name |
SHA256 hash |
---|---|
sts2019-kb5002796-fullfile-x64-glb.exe |
3865CBCE17DAE4A57A6FA1C79310E58967EC5BDE6FCC9261DAAB494B0041EEE6 |
File information
Download the list of files that are included in security update 5002796.
Information about protection and security
Protect yourself online:Â Windows Security support
Learn how we guard against cyber threats:Â Microsoft Security