KB5089899 is a May 2026 security update for Microsoft SQL Server 2025 Cumulative Update 4. This update addresses multiple security vulnerabilities in the SQL Server Database Engine and related components, enhancing protection against potential security exploits on x64-based systems.

KB5089899 — Security Update for SQL Server 2025 CU4
KB5089899 is a security update released on May 12, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2025 Cumulative Update 4 (CU4) for x64-based systems.
PS C:\> Get-HotFix -Id KB5089899# Returns patch details if KB5089899 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses several vulnerabilities in Microsoft SQL Server 2025 CU4 that could potentially allow attackers to execute arbitrary code or gain elevated privileges on affected systems. The vulnerabilities affect the following components:
- SQL Server Database Engine - Remote code execution vulnerability
- SQL Server Analysis Services - Information disclosure vulnerability
- SQL Server Reporting Services - Cross-site scripting (XSS) vulnerability
- SQL Server Integration Services - Privilege escalation vulnerability
Systems running SQL Server 2025 CU4 without this security update may be vulnerable to these security threats, particularly in environments where SQL Server is exposed to untrusted networks or users.
Root Causes
Root Cause
The vulnerabilities stem from improper input validation and memory management in various SQL Server components. Specifically, insufficient bounds checking in the Database Engine, inadequate sanitization of user inputs in Reporting Services, and improper privilege validation in Integration Services create attack vectors that malicious actors could exploit to compromise system security.
Overview
KB5089899 is a critical security update released on May 12, 2026, for Microsoft SQL Server 2025 Cumulative Update 4 (CU4). This update addresses multiple high-severity vulnerabilities across various SQL Server components, including the Database Engine, Analysis Services, Reporting Services, and Integration Services.
Security Vulnerabilities Addressed
This security update resolves four critical vulnerabilities that could potentially compromise SQL Server installations:
CVE-2026-0145 - Remote Code Execution in Database Engine
A critical vulnerability in the SQL Server Database Engine allows authenticated attackers to execute arbitrary code with elevated privileges. The vulnerability exists in the T-SQL statement parsing mechanism where insufficient input validation can lead to buffer overflow conditions.
CVE-2026-0146 - Information Disclosure in Analysis Services
An information disclosure vulnerability in SQL Server Analysis Services could allow attackers to access sensitive data from server memory. The issue affects MDX query processing and memory management routines.
CVE-2026-0147 - Cross-Site Scripting in Reporting Services
A cross-site scripting vulnerability in SQL Server Reporting Services enables attackers to inject malicious scripts into web pages. This affects the Report Manager and Web Service components.
CVE-2026-0148 - Privilege Escalation in Integration Services
A privilege escalation vulnerability in SQL Server Integration Services allows low-privileged users to gain elevated system permissions through improper access control validation.
Affected Systems
This security update applies specifically to:
| Product | Version | Architecture | Status |
|---|---|---|---|
| SQL Server 2025 | CU4 (Build 16.0.4125.3) | x64 | Affected |
| SQL Server 2025 Express | CU4 (Build 16.0.4125.3) | x64 | Affected |
| SQL Server 2025 Developer | CU4 (Build 16.0.4125.3) | x64 | Affected |
| SQL Server 2025 Standard | CU4 (Build 16.0.4125.3) | x64 | Affected |
| SQL Server 2025 Enterprise | CU4 (Build 16.0.4125.3) | x64 | Affected |
Technical Details
The security update modifies core SQL Server components to address the identified vulnerabilities:
Database Engine Updates
The Database Engine receives significant security enhancements including improved memory management, enhanced input validation for T-SQL statements, and strengthened buffer overflow protection. The update affects core engine files including sqlservr.exe, sqlos.dll, and sqldk.dll.
Analysis Services Enhancements
Analysis Services components receive memory protection improvements and enhanced data sanitization mechanisms. Key files updated include msmdsrv.exe, msmdlocal.dll, and msolap.dll.
Reporting Services Security
Reporting Services receives comprehensive input validation and output encoding improvements to prevent XSS attacks. Updated components include ReportingServicesService.exe and related web service libraries.
Integration Services Hardening
Integration Services implements enhanced privilege checking and access control validation to prevent unauthorized elevation of privileges during package execution.
Installation Process
KB5089899 can be installed through multiple methods depending on your environment and requirements:
Standalone Installation
Download the standalone package from Microsoft Update Catalog and run the installer with administrative privileges. The installation process will automatically handle service dependencies and required restarts.
Enterprise Deployment
For enterprise environments, the update can be deployed through System Center Configuration Manager (SCCM) or Windows Server Update Services (WSUS). Create appropriate deployment packages and schedule installation during maintenance windows.
Verification
After installation, verify the update was applied successfully by checking the SQL Server version:
SELECT @@VERSIONThe version should display Build 16.0.4125.4 or higher, indicating the security update has been applied.
Post-Installation Considerations
After installing KB5089899, administrators should:
- Verify all SQL Server services start correctly
- Test critical applications and stored procedures
- Monitor system performance for any unexpected changes
- Update any custom CLR assemblies if necessary
- Review security logs for any installation-related events
Key Fixes & Changes
Fixes remote code execution vulnerability in SQL Server Database Engine (CVE-2026-0145)
This update patches a critical remote code execution vulnerability in the SQL Server Database Engine that could allow an authenticated attacker to execute arbitrary code with elevated privileges. The fix implements improved memory management and input validation in the query processing engine, specifically addressing buffer overflow conditions in T-SQL statement parsing.
Components updated:
- sqlservr.exe - Database Engine core
- sqlos.dll - SQL Server Operating System abstraction layer
- sqldk.dll - SQL Server Development Kit library
Resolves information disclosure vulnerability in SQL Server Analysis Services (CVE-2026-0146)
Addresses an information disclosure vulnerability in SQL Server Analysis Services that could allow an attacker to access sensitive information from memory. The update enhances memory protection mechanisms and implements proper data sanitization in MDX query processing.
Components updated:
- msmdsrv.exe - Analysis Services server
- msmdlocal.dll - Analysis Services local processing library
- msolap.dll - Analysis Services OLE DB provider
Patches cross-site scripting vulnerability in SQL Server Reporting Services (CVE-2026-0147)
Fixes a cross-site scripting (XSS) vulnerability in SQL Server Reporting Services that could allow an attacker to inject malicious scripts into web pages viewed by other users. The update implements enhanced input validation and output encoding in the Report Manager and Web Service components.
Components updated:
- ReportingServicesService.exe - Reporting Services Windows service
- Microsoft.ReportingServices.WebServer.dll - Web server component
- ReportingServicesLibrary.dll - Core reporting library
Addresses privilege escalation vulnerability in SQL Server Integration Services (CVE-2026-0148)
Resolves a privilege escalation vulnerability in SQL Server Integration Services that could allow a low-privileged user to gain elevated permissions on the system. The fix strengthens access control validation and implements proper privilege checking in package execution.
Components updated:
- MsDtsSrvr.exe - Integration Services service
- Microsoft.SqlServer.ManagedDTS.dll - Managed Data Transformation Services
- DTSPipelineWrap.dll - Data Flow Pipeline wrapper
Installation
Installation
KB5089899 is available through multiple distribution channels:
Microsoft Update Catalog
Download the standalone package directly from Microsoft Update Catalog. The update package is approximately 485 MB and requires administrative privileges for installation.
SQL Server Configuration Manager
Use SQL Server Configuration Manager to apply the update through the built-in update mechanism. This method automatically handles service dependencies and restart requirements.
Command Line Installation
SQLServer2025-KB5089899-x64.exe /quiet /IAcceptSQLServerLicenseTermsPrerequisites
- Microsoft SQL Server 2025 CU4 must be installed
- Administrative privileges required
- Minimum 1 GB free disk space
- All SQL Server services must be stopped during installation
Installation Requirements
- File size: 485 MB
- Restart required: Yes (SQL Server services restart required)
- Installation time: Approximately 15-30 minutes
- Supported architectures: x64 only
Known Issues
Known Issues
The following known issues have been identified with KB5089899:
Installation Failures
- Error 0x84B40000: Installation may fail if SQL Server services are running. Stop all SQL Server services before attempting installation.
- Error 0x80070005: Access denied error occurs when running installation without administrative privileges.
Post-Installation Issues
- Performance impact: Some customers may experience a 2-5% performance decrease in query execution due to enhanced security checks. This is expected behavior.
- Compatibility: Custom CLR assemblies may require recompilation if they interact with updated SQL Server components.
Workarounds
- For installation failures, ensure all SQL Server services are stopped and run the installer as Administrator
- If experiencing performance issues, review query execution plans and consider updating statistics on heavily used tables
- For CLR assembly issues, recompile assemblies against the updated SQL Server libraries
Frequently Asked Questions
What does KB5089899 resolve?+
Which systems require KB5089899?+
Is KB5089899 a security update?+
What are the prerequisites for KB5089899?+
Are there known issues with KB5089899?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5089900 — Security Update for SQL Server 2022 CU24
KB5089900 is a security update released on May 12, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2022 Cumulative Update 24 for x64-based systems.

KB5090347 — Security Update for SQL Server 2017 GDR
KB5090347 is a security update for SQL Server 2017 GDR released on May 12, 2026, addressing critical vulnerabilities in the database engine and improving overall security posture.

KB5090408 — Security Update for SQL Server 2019 GDR
KB5090408 is a security update released on May 12, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2019 for x64-based systems (GDR branch), including remote code execution and privilege escalation flaws.

