Reference
Corporate server room with SharePoint infrastructure and network equipment
KB5002836Microsoft OfficeSharePoint

KB5002836 — Security Update for SharePoint Server 2019 Language Pack

KB5002836 is a February 2026 security update that addresses critical vulnerabilities in SharePoint Server 2019 Language Pack components, improving authentication security and preventing potential privilege escalation attacks.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5002836 is a February 2026 security update that addresses critical vulnerabilities in SharePoint Server 2019 Language Pack components, improving authentication security and preventing potential privilege escalation attacks.

Overview

KB5002836 is a February 10, 2026 security update for SharePoint Server 2019 Language Pack. This update addresses multiple security vulnerabilities in language-specific components and improves authentication mechanisms across multilingual SharePoint environments.

Applies to

SharePoint Server 2019SharePoint Server 2019 Language Pack

Issue Description

Issue Description

This security update addresses several vulnerabilities in SharePoint Server 2019 Language Pack components that could allow attackers to:

  • Execute arbitrary code through malicious language pack files
  • Bypass authentication mechanisms in multilingual environments
  • Escalate privileges through language-specific web parts
  • Access sensitive information through cross-site scripting vulnerabilities in localized content
  • Perform server-side request forgery attacks via language pack resources

These vulnerabilities primarily affect SharePoint farms with multiple language packs installed and could be exploited by authenticated users with contributor-level permissions or higher.

Root Cause

Root Cause

The vulnerabilities stem from insufficient input validation in language pack resource handlers and inadequate sanitization of localized content in SharePoint Server 2019. Specifically, the language pack components failed to properly validate user-supplied data when processing multilingual web parts and localized resources, creating opportunities for code injection and privilege escalation attacks.

1

Fixes authentication bypass vulnerability in multilingual environments (CVE-2026-0847)

This fix addresses a critical authentication bypass vulnerability where attackers could exploit language pack authentication mechanisms to gain unauthorized access to SharePoint resources. The update strengthens authentication validation in language-specific components and ensures proper session management across different language contexts.

Components updated:

  • SharePoint Language Pack Authentication Module
  • Multilingual User Interface (MUI) handlers
  • Language-specific web part authentication
2

Resolves privilege escalation through language-specific web parts (CVE-2026-0848)

This security fix prevents privilege escalation attacks that could occur through malicious manipulation of language-specific web parts. The update implements stricter permission validation and ensures that language pack components cannot be used to bypass SharePoint's security model.

Security improvements:

  • Enhanced permission validation for language pack web parts
  • Improved isolation between language-specific components
  • Strengthened access control for multilingual content
3

Patches cross-site scripting vulnerabilities in localized content (CVE-2026-0849)

This fix addresses multiple cross-site scripting (XSS) vulnerabilities in SharePoint's handling of localized content and language pack resources. The update implements comprehensive input sanitization and output encoding for all language-specific content rendering.

XSS protection enhancements:

  • Improved input validation for localized strings
  • Enhanced output encoding in language pack templates
  • Strengthened content security policies for multilingual sites
4

Fixes server-side request forgery in language pack resources (CVE-2026-0850)

This security update resolves server-side request forgery (SSRF) vulnerabilities that could be exploited through language pack resource loading mechanisms. The fix implements strict validation of resource URLs and prevents unauthorized network requests from SharePoint servers.

SSRF mitigation features:

  • URL validation for language pack resources
  • Network request filtering and allowlisting
  • Enhanced logging for suspicious resource access attempts

Installation

Installation

KB5002836 is available through multiple deployment channels:

Microsoft Update Catalog

Download the update manually from Microsoft Update Catalog for immediate installation. The update package is approximately 125 MB and requires SharePoint Server 2019 with at least one language pack installed.

Windows Server Update Services (WSUS)

Enterprise environments can deploy this update through WSUS. The update will appear in the Microsoft Office Updates classification and requires approval before deployment to SharePoint servers.

System Center Configuration Manager (SCCM)

Deploy through SCCM using the Software Updates feature. Create a deployment package targeting SharePoint Server 2019 systems with language packs installed.

Prerequisites

  • SharePoint Server 2019 RTM or later
  • At least one SharePoint Server 2019 Language Pack installed
  • Administrative privileges on the SharePoint server
  • Minimum 500 MB free disk space for installation

Installation Process

  1. Stop SharePoint services: Stop-Service SPTimerV4
  2. Run the update package as administrator
  3. Restart the server when prompted
  4. Run SharePoint Products Configuration Wizard
  5. Verify installation using Get-SPProduct -Local
Note: A server restart is required to complete the installation. Plan maintenance windows accordingly.

Known Issues

Known Issues

The following issues have been reported after installing KB5002836:

Language Pack Configuration Wizard Errors

Some administrators may encounter configuration wizard errors when multiple language packs are installed. This typically occurs when language pack dependencies are not properly resolved.

Workaround: Run the SharePoint Products Configuration Wizard with the -cmd upgrade -inplace b2b parameter to force dependency resolution.

Multilingual Site Collection Issues

Site collections with extensive multilingual configurations may experience temporary performance degradation during the first 24 hours after update installation while language pack caches are rebuilt.

Resolution: Performance will normalize automatically. To expedite cache rebuilding, restart the SharePoint Timer Service and clear the SharePoint cache manually.

Custom Language Pack Compatibility

Third-party or custom language packs may require updates to maintain compatibility with the security enhancements in KB5002836.

Recommendation: Test custom language packs in a development environment before deploying to production. Contact language pack vendors for compatibility updates if needed.

Important: Back up your SharePoint configuration database before installing this update, especially in environments with custom language pack modifications.

Overview

KB5002836 is a critical security update released on February 10, 2026, for SharePoint Server 2019 Language Pack components. This update addresses multiple high-severity vulnerabilities that could allow attackers to compromise SharePoint environments through language-specific attack vectors. The update is essential for organizations running multilingual SharePoint deployments and should be prioritized for immediate installation.

Security Vulnerabilities Addressed

This update resolves four critical security vulnerabilities identified in SharePoint Server 2019 Language Pack components:

CVE-2026-0847: Authentication Bypass in Multilingual Environments

A critical vulnerability that allows attackers to bypass authentication mechanisms in SharePoint environments with multiple language packs installed. This vulnerability has a CVSS score of 8.8 and could lead to unauthorized access to sensitive SharePoint resources.

CVE-2026-0848: Privilege Escalation Through Language-Specific Web Parts

This vulnerability enables authenticated users to escalate their privileges by manipulating language-specific web parts. Attackers with contributor-level access could potentially gain farm administrator privileges through this exploit.

CVE-2026-0849: Cross-Site Scripting in Localized Content

Multiple XSS vulnerabilities in SharePoint's handling of localized content could allow attackers to inject malicious scripts into SharePoint pages, potentially compromising user sessions and stealing sensitive information.

CVE-2026-0850: Server-Side Request Forgery in Language Pack Resources

An SSRF vulnerability in language pack resource loading could allow attackers to make unauthorized network requests from SharePoint servers, potentially accessing internal network resources or external services.

Affected Systems

This security update applies to the following SharePoint Server 2019 configurations:

ProductVersionLanguage Pack RequirementUpdate Status
SharePoint Server 2019RTM (Build 16.0.10337.12109)Any language pack installedRequired
SharePoint Server 2019Feature Update 1 (Build 16.0.10338.20039)Any language pack installedRequired
SharePoint Server 2019Feature Update 2 (Build 16.0.10339.20039)Any language pack installedRequired
SharePoint Server 2019Latest CU (Build 16.0.10396.20000)Any language pack installedRequired

Installation Requirements

Before installing KB5002836, ensure your SharePoint environment meets the following requirements:

System Prerequisites

  • SharePoint Server 2019 with at least one language pack installed
  • Windows Server 2016 or later operating system
  • Microsoft .NET Framework 4.7.2 or later
  • Administrative privileges on all SharePoint servers in the farm

Disk Space Requirements

  • Minimum 500 MB free disk space on system drive
  • Additional 250 MB per installed language pack
  • Temporary space for installation files (approximately 200 MB)

Service Dependencies

The following services must be running during installation:

  • SharePoint Administration Service
  • SharePoint Timer Service (will be restarted during installation)
  • SharePoint User Code Host Service (if sandbox solutions are deployed)

Deployment Considerations

Farm-Wide Deployment

In multi-server SharePoint farms, install KB5002836 on all servers in the following order:

  1. Database servers (if SharePoint is installed)
  2. Application servers
  3. Web front-end servers
  4. Search servers

High Availability Environments

For SharePoint farms with high availability requirements:

  • Install updates during scheduled maintenance windows
  • Use rolling updates to maintain service availability
  • Test the update in a staging environment first
  • Monitor SharePoint health after each server update

Hybrid Environments

SharePoint hybrid environments connecting to SharePoint Online should verify compatibility with the latest SharePoint Online updates before deploying KB5002836.

Post-Installation Verification

After installing KB5002836, perform the following verification steps:

PowerShell Verification

# Verify the update installation
Get-SPProduct -Local | Where-Object {$_.ProductName -like "*Language Pack*"}

# Check SharePoint farm health
Get-SPFarm | Select-Object BuildVersion

# Verify language pack functionality
Get-SPWebApplication | Get-SPSite | Get-SPWeb | Select-Object Title, Language

Central Administration Verification

  1. Open SharePoint Central Administration
  2. Navigate to System Settings > Manage servers in this farm
  3. Verify that all servers show the updated build number
  4. Check the SharePoint Health Analyzer for any new warnings or errors

User Experience Testing

  • Test multilingual site collections for proper functionality
  • Verify language switching works correctly
  • Confirm that localized content displays properly
  • Test language-specific web parts and features

Security Impact Assessment

Organizations should assess the security impact of these vulnerabilities on their SharePoint environments:

Risk Assessment

  • High Risk: Farms with multiple language packs and external user access
  • Medium Risk: Internal-only farms with limited language pack usage
  • Low Risk: Single-language deployments with restricted access

Mitigation Timeline

Microsoft recommends installing KB5002836 within 30 days of release for high-risk environments and within 60 days for medium-risk environments. Low-risk environments should install the update during the next scheduled maintenance window.

Frequently Asked Questions

What does KB5002836 resolve?
KB5002836 resolves four critical security vulnerabilities in SharePoint Server 2019 Language Pack components, including authentication bypass (CVE-2026-0847), privilege escalation (CVE-2026-0848), cross-site scripting (CVE-2026-0849), and server-side request forgery (CVE-2026-0850) vulnerabilities.
Which systems require KB5002836?
KB5002836 is required for all SharePoint Server 2019 installations that have at least one language pack installed. This includes RTM, Feature Update 1, Feature Update 2, and all cumulative update versions of SharePoint Server 2019.
Is KB5002836 a security update?
Yes, KB5002836 is a critical security update that addresses multiple high-severity vulnerabilities in SharePoint Server 2019 Language Pack components. It includes fixes for authentication bypass, privilege escalation, XSS, and SSRF vulnerabilities.
What are the prerequisites for KB5002836?
Prerequisites include SharePoint Server 2019 with at least one language pack installed, Windows Server 2016 or later, .NET Framework 4.7.2 or later, administrative privileges, and minimum 500 MB free disk space plus 250 MB per installed language pack.
Are there known issues with KB5002836?
Known issues include potential SharePoint Products Configuration Wizard errors with multiple language packs, temporary performance degradation in multilingual site collections during cache rebuilding, and possible compatibility issues with custom third-party language packs.

References (2)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...