Microsoft Events Vulnerability Exposes Users Personal Data From Registration And Waitlist Databases


A significant security flaw has been discovered within the Microsoft Events platform, which could have allowed attackers to access the personal information of users from two separate databases: the event registration list and the waitlist.

The vulnerability, uncovered by a 15-year-old bug bounty hunter known as Faav, exposed sensitive user data, including full names, email addresses, phone numbers, and in some cases, physical addresses. The flaw was responsibly disclosed to Microsoft and has since been patched.

The investigation began when the researcher started examining the events.microsoft.com subdomain, which led to the discovery of several API endpoints on the msevents.microsoft.com domain.

Attack Chain
Attack Chain

Initial tests for vulnerabilities on various endpoints returned no sensitive data. The first breakthrough came when an OData injection flaw was identified in the /api/GetEvents endpoint.

However, this initial entry point proved to be a dead end, as it only returned non-sensitive, public event information and threw errors when attempts were made to access other data tables like accounts or contacts.

Database Match
Database Match

A similar injection vulnerability was found in another endpoint /api/GetEventCustomRegistrationFields, which allowed the enumeration of all Microsoft events but still did not leak any user data.

google

Microsoft Events Vulnerability

The crucial discovery was made within a POST endpoint named /api/CheckEventRegistration. This feature was designed to check if a user’s email was already registered for a specific event.

The researcher found that by injecting malicious payloads into the email and eventId fields, it was possible to trick the system.

A specific OData injection technique revealed that the endpoint was making two separate requests to two different databases. By carefully crafting the input, Faav was able to target each database individually.

One injection allowed the enumeration of the entire Waitlist database, which contained fields such as fullname, telephone1, address1_line1, company, and email addresses, including many from government and corporate domains.

Contact form
Contact form

By reversing the injection technique, the researcher was able to access the second database, the Event Registration list.

This database contained personal details like first name, last name, phone number, company name, and country. Some events even included custom fields for Partner IDs and Tenant IDs.

The researcher noted that there were no rate limits in place, meaning an attacker could have scripted the extraction of all data from both databases.

After successfully demonstrating the ability to leak this information, Faav stopped further testing and reported the findings to the Microsoft Security Response Center (MSRC) on July 23, 2025.

According to the timeline provided, Microsoft acknowledged the issue and completed a fix by August 26, 2025.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

googlenews



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.