Signal
Critical vulnerabilities disclosed in Microsoft SharePoint Server and Gainsight Assist plugin
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-03-20 13:00 UTCUpdated 2026-03-20 18:23 UTC
rss
cvevulnerabilitiesexploitssecurity_advisoriesincident_response
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.2 top sources shown
limited source diversity in top sources
Overview
Two significant security vulnerabilities have been recently disclosed and addressed.
Entities
MicrosoftGainsightGainsight AssistChristopher O’Boyle
Score total
0.96
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
- Active exploitation of the SharePoint vulnerability has been observed, increasing urgency for mitigation.
- Gainsight released fixes in early March 2026, highlighting recent remediation efforts.
- These disclosures reflect ongoing cybersecurity challenges in enterprise software environments.
Why it matters
- Microsoft SharePoint Server is widely deployed in enterprises, so exploitation risks can cause significant operational impact.
- Gainsight Assist plugin vulnerabilities could allow attackers to escalate from information disclosure to active client-side attacks.
- Timely patching and awareness are critical to prevent exploitation of these vulnerabilities.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
- Microsoft SharePoint Server is affected by a critical deserialization vulnerability (CVE-2026-20963) that allows unauthenticated remote code execution and is actively exploited.
- Gainsight Assist plugin has an information disclosure flaw (CVE-2026-31381) and a reflected cross-site scripting vulnerability (CVE-2026-31382) that could be chained for active exploitation.
How sources frame it
- Rapid7: neutral
- Canadian Centre For Cyber Security: neutral
This briefing highlights the urgency of patching critical vulnerabilities in enterprise software to prevent active exploitation.
All evidence
All evidence
AL26-005 – Critical vulnerability impacting Microsoft SharePoint Server – CVE-2026-20963
Canadian Centre for Cyber Security - Alerts · cyber.gc.ca · 2026-03-20 18:23 UTC
CVE-2026-31381, CVE-2026-31382: Gainsight Assist Information Disclosure and Cross-Site Scripting (FIXED)
Rapid7 Blog · rapid7.com · 2026-03-20 13:00 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
- Canadian Centre for Cyber Security - Alerts (1)
- Rapid7 Blog (1)
Top origin domains (this list)
- cyber.gc.ca (1)
- rapid7.com (1)