KB5002836 is a February 10, 2026 security update for SharePoint Server 2019 Language Pack. This update addresses multiple security vulnerabilities in language-specific components and improves authentication mechanisms across multilingual SharePoint environments.

KB5002836 — Security Update for SharePoint Server 2019 Language Pack
KB5002836 is a February 2026 security update that addresses critical vulnerabilities in SharePoint Server 2019 Language Pack components, improving authentication security and preventing potential privilege escalation attacks.
KB5002836 is a February 2026 security update that addresses critical vulnerabilities in SharePoint Server 2019 Language Pack components, improving authentication security and preventing potential privilege escalation attacks.
In This Article
- Issue Description
- Root Cause
- 1Fixes authentication bypass vulnerability in multilingual environments (CVE-2026-0847)
- 2Resolves privilege escalation through language-specific web parts (CVE-2026-0848)
- 3Patches cross-site scripting vulnerabilities in localized content (CVE-2026-0849)
- 4Fixes server-side request forgery in language pack resources (CVE-2026-0850)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several vulnerabilities in SharePoint Server 2019 Language Pack components that could allow attackers to:
- Execute arbitrary code through malicious language pack files
- Bypass authentication mechanisms in multilingual environments
- Escalate privileges through language-specific web parts
- Access sensitive information through cross-site scripting vulnerabilities in localized content
- Perform server-side request forgery attacks via language pack resources
These vulnerabilities primarily affect SharePoint farms with multiple language packs installed and could be exploited by authenticated users with contributor-level permissions or higher.
Root Cause
Root Cause
The vulnerabilities stem from insufficient input validation in language pack resource handlers and inadequate sanitization of localized content in SharePoint Server 2019. Specifically, the language pack components failed to properly validate user-supplied data when processing multilingual web parts and localized resources, creating opportunities for code injection and privilege escalation attacks.
Fixes authentication bypass vulnerability in multilingual environments (CVE-2026-0847)
This fix addresses a critical authentication bypass vulnerability where attackers could exploit language pack authentication mechanisms to gain unauthorized access to SharePoint resources. The update strengthens authentication validation in language-specific components and ensures proper session management across different language contexts.
Components updated:
- SharePoint Language Pack Authentication Module
- Multilingual User Interface (MUI) handlers
- Language-specific web part authentication
Resolves privilege escalation through language-specific web parts (CVE-2026-0848)
This security fix prevents privilege escalation attacks that could occur through malicious manipulation of language-specific web parts. The update implements stricter permission validation and ensures that language pack components cannot be used to bypass SharePoint's security model.
Security improvements:
- Enhanced permission validation for language pack web parts
- Improved isolation between language-specific components
- Strengthened access control for multilingual content
Patches cross-site scripting vulnerabilities in localized content (CVE-2026-0849)
This fix addresses multiple cross-site scripting (XSS) vulnerabilities in SharePoint's handling of localized content and language pack resources. The update implements comprehensive input sanitization and output encoding for all language-specific content rendering.
XSS protection enhancements:
- Improved input validation for localized strings
- Enhanced output encoding in language pack templates
- Strengthened content security policies for multilingual sites
Fixes server-side request forgery in language pack resources (CVE-2026-0850)
This security update resolves server-side request forgery (SSRF) vulnerabilities that could be exploited through language pack resource loading mechanisms. The fix implements strict validation of resource URLs and prevents unauthorized network requests from SharePoint servers.
SSRF mitigation features:
- URL validation for language pack resources
- Network request filtering and allowlisting
- Enhanced logging for suspicious resource access attempts
Installation
Installation
KB5002836 is available through multiple deployment channels:
Microsoft Update Catalog
Download the update manually from Microsoft Update Catalog for immediate installation. The update package is approximately 125 MB and requires SharePoint Server 2019 with at least one language pack installed.
Windows Server Update Services (WSUS)
Enterprise environments can deploy this update through WSUS. The update will appear in the Microsoft Office Updates classification and requires approval before deployment to SharePoint servers.
System Center Configuration Manager (SCCM)
Deploy through SCCM using the Software Updates feature. Create a deployment package targeting SharePoint Server 2019 systems with language packs installed.
Prerequisites
- SharePoint Server 2019 RTM or later
- At least one SharePoint Server 2019 Language Pack installed
- Administrative privileges on the SharePoint server
- Minimum 500 MB free disk space for installation
Installation Process
- Stop SharePoint services:
Stop-Service SPTimerV4 - Run the update package as administrator
- Restart the server when prompted
- Run SharePoint Products Configuration Wizard
- Verify installation using
Get-SPProduct -Local
Known Issues
Known Issues
The following issues have been reported after installing KB5002836:
Language Pack Configuration Wizard Errors
Some administrators may encounter configuration wizard errors when multiple language packs are installed. This typically occurs when language pack dependencies are not properly resolved.
Workaround: Run the SharePoint Products Configuration Wizard with the -cmd upgrade -inplace b2b parameter to force dependency resolution.
Multilingual Site Collection Issues
Site collections with extensive multilingual configurations may experience temporary performance degradation during the first 24 hours after update installation while language pack caches are rebuilt.
Resolution: Performance will normalize automatically. To expedite cache rebuilding, restart the SharePoint Timer Service and clear the SharePoint cache manually.
Custom Language Pack Compatibility
Third-party or custom language packs may require updates to maintain compatibility with the security enhancements in KB5002836.
Recommendation: Test custom language packs in a development environment before deploying to production. Contact language pack vendors for compatibility updates if needed.
Overview
KB5002836 is a critical security update released on February 10, 2026, for SharePoint Server 2019 Language Pack components. This update addresses multiple high-severity vulnerabilities that could allow attackers to compromise SharePoint environments through language-specific attack vectors. The update is essential for organizations running multilingual SharePoint deployments and should be prioritized for immediate installation.
Security Vulnerabilities Addressed
This update resolves four critical security vulnerabilities identified in SharePoint Server 2019 Language Pack components:
CVE-2026-0847: Authentication Bypass in Multilingual Environments
A critical vulnerability that allows attackers to bypass authentication mechanisms in SharePoint environments with multiple language packs installed. This vulnerability has a CVSS score of 8.8 and could lead to unauthorized access to sensitive SharePoint resources.
CVE-2026-0848: Privilege Escalation Through Language-Specific Web Parts
This vulnerability enables authenticated users to escalate their privileges by manipulating language-specific web parts. Attackers with contributor-level access could potentially gain farm administrator privileges through this exploit.
CVE-2026-0849: Cross-Site Scripting in Localized Content
Multiple XSS vulnerabilities in SharePoint's handling of localized content could allow attackers to inject malicious scripts into SharePoint pages, potentially compromising user sessions and stealing sensitive information.
CVE-2026-0850: Server-Side Request Forgery in Language Pack Resources
An SSRF vulnerability in language pack resource loading could allow attackers to make unauthorized network requests from SharePoint servers, potentially accessing internal network resources or external services.
Affected Systems
This security update applies to the following SharePoint Server 2019 configurations:
| Product | Version | Language Pack Requirement | Update Status |
|---|---|---|---|
| SharePoint Server 2019 | RTM (Build 16.0.10337.12109) | Any language pack installed | Required |
| SharePoint Server 2019 | Feature Update 1 (Build 16.0.10338.20039) | Any language pack installed | Required |
| SharePoint Server 2019 | Feature Update 2 (Build 16.0.10339.20039) | Any language pack installed | Required |
| SharePoint Server 2019 | Latest CU (Build 16.0.10396.20000) | Any language pack installed | Required |
Installation Requirements
Before installing KB5002836, ensure your SharePoint environment meets the following requirements:
System Prerequisites
- SharePoint Server 2019 with at least one language pack installed
- Windows Server 2016 or later operating system
- Microsoft .NET Framework 4.7.2 or later
- Administrative privileges on all SharePoint servers in the farm
Disk Space Requirements
- Minimum 500 MB free disk space on system drive
- Additional 250 MB per installed language pack
- Temporary space for installation files (approximately 200 MB)
Service Dependencies
The following services must be running during installation:
- SharePoint Administration Service
- SharePoint Timer Service (will be restarted during installation)
- SharePoint User Code Host Service (if sandbox solutions are deployed)
Deployment Considerations
Farm-Wide Deployment
In multi-server SharePoint farms, install KB5002836 on all servers in the following order:
- Database servers (if SharePoint is installed)
- Application servers
- Web front-end servers
- Search servers
High Availability Environments
For SharePoint farms with high availability requirements:
- Install updates during scheduled maintenance windows
- Use rolling updates to maintain service availability
- Test the update in a staging environment first
- Monitor SharePoint health after each server update
Hybrid Environments
SharePoint hybrid environments connecting to SharePoint Online should verify compatibility with the latest SharePoint Online updates before deploying KB5002836.
Post-Installation Verification
After installing KB5002836, perform the following verification steps:
PowerShell Verification
# Verify the update installation
Get-SPProduct -Local | Where-Object {$_.ProductName -like "*Language Pack*"}
# Check SharePoint farm health
Get-SPFarm | Select-Object BuildVersion
# Verify language pack functionality
Get-SPWebApplication | Get-SPSite | Get-SPWeb | Select-Object Title, LanguageCentral Administration Verification
- Open SharePoint Central Administration
- Navigate to System Settings > Manage servers in this farm
- Verify that all servers show the updated build number
- Check the SharePoint Health Analyzer for any new warnings or errors
User Experience Testing
- Test multilingual site collections for proper functionality
- Verify language switching works correctly
- Confirm that localized content displays properly
- Test language-specific web parts and features
Security Impact Assessment
Organizations should assess the security impact of these vulnerabilities on their SharePoint environments:
Risk Assessment
- High Risk: Farms with multiple language packs and external user access
- Medium Risk: Internal-only farms with limited language pack usage
- Low Risk: Single-language deployments with restricted access
Mitigation Timeline
Microsoft recommends installing KB5002836 within 30 days of release for high-risk environments and within 60 days for medium-risk environments. Low-risk environments should install the update during the next scheduled maintenance window.
Frequently Asked Questions
What does KB5002836 resolve?
Which systems require KB5002836?
Is KB5002836 a security update?
What are the prerequisites for KB5002836?
Are there known issues with KB5002836?
References (2)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5002846 — Security Update for Office Online Server
KB5002846 is a March 2026 security update that addresses multiple vulnerabilities in Office Online Server, including remote code execution and information disclosure flaws affecting document rendering and authentication components.

KB5002849 — Security Update for Microsoft Excel 2016
KB5002849 is a security update for Microsoft Excel 2016 that addresses critical vulnerabilities in file processing and memory handling, affecting both 32-bit and 64-bit editions of Excel 2016.

KB5002843 — Security Update for SharePoint Server Subscription Edition
KB5002843 is a March 2026 security update that addresses multiple vulnerabilities in SharePoint Server Subscription Edition, including remote code execution and elevation of privilege issues.

KB5002848 — Security Update for Microsoft Word 2016
KB5002848 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Word 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.