CVE-2025-53770

Analyzed
Published: 20 Jul 2025, 01:15
Last modified:30 Jul 2025, 01:00

Vulnerability Summary

Overall Risk
Critical Risk
96/100
CVSS Score
9.8 CRITICAL
v3.1
EPSS Score
85.69% CRITICAL
99%ile 0.00%
CISA KEV
Active
Ransomware
Known Use
Exploits
2 found
Dark Web
Not detected
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Source Identifier: secure@microsoft.com
CVSSSourceSeverityExploitabilityImpactVector
v4.0n/a
v3.1 secure@microsoft.com9.8 CRITICAL3.95.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H...
v3.0n/a
v2.0n/a
85.69%
Current Score
0.00%
99%ile
Percentile Rank
0.00%
Loading chart...
Loading chart...
Deserialization of Untrusted Data CWE-502
Description:The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Vulnerability Name:Microsoft SharePoint Deserialization of Untrusted Data Vulnerability
Added to CISA Catalog:20 Jul 2025, 00:00
Action Due:21 Jul 2025, 00:00
Known Ransomware: Ransomware
Required Action:Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

No dark web activity detected for this vulnerability.

exploitdb
windows
remoteUnverified
Author: Agampreet Singh
Published: 11 Aug 2025, 00:00
Microsoft SharePoint Server 2019 (16.0.10383.20020) - Remote Code Execution (RCE)
metasploit
Windows
exploitVerified
Authors: Viettel Cyber Security, sfewer-r7
Published: 08 Jul 2025, 00:00
Updated: 06 Aug 2025, 15:33
This module exploits the authentication bypass vulnerabilities CVE-2025-49706 and CVE-2025-53771, and an unsafe deserialization vulnerability CVE-2025-49704, to achieve unauthenticated RCE against a vulnerable Microsoft SharePoint Server. The vulnerability CVE-2025-53770 was disclosed as being a patch bypass of CVE-2025-49704, and as described by the finders, CVE-2025-53770 targets a different endpoint within the /_vti_bin/ URI path. As this exploit module does not target the endpoint associated with CVE-2025-53770 (per the original finders), we believe this module is best described as exploiting CVE-2025-49704 and not CVE-2025-53770.
CVE-2025-49704CVE-2025-49706CVE-2025-53770CVE-2025-53771blog.viettelcybersecurity.com/sharepoint-toolshell/blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/securelist.com/toolshell-explained/zerodayinitiative.com/advisories/ZDI-25-580/zerodayinitiative.com/advisories/ZDI-25-581/msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/

Affected Configurations (CPE)

microsoft sharepoint_serverVulnerable
Version: *
cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
microsoft sharepoint_serverVulnerable
Version: 2016
cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
microsoft sharepoint_serverVulnerable
Version: 2019
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
URLTagsSource
https://arstechnica.com/security/2025/07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe/exploitpress/media coverageaf854a3a-2127-422b-91ae-364da2661108
https://github.com/kaizensecurity/CVE-2025-53770exploitaf854a3a-2127-422b-91ae-364da2661108
https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/mitigationvendor advisoryaf854a3a-2127-422b-91ae-364da2661108
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770vendor advisorysecure@microsoft.com
https://news.ycombinator.com/item?id=44629710issue trackingaf854a3a-2127-422b-91ae-364da2661108
https://research.eye.security/sharepoint-under-siege/exploitmitigationthird party advisoryaf854a3a-2127-422b-91ae-364da2661108
https://therecord.media/microsoft-sharepoint-zero-day-vulnerability-exploited-globallypress/media coverageaf854a3a-2127-422b-91ae-364da2661108
https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/press/media coverageaf854a3a-2127-422b-91ae-364da2661108
https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770mailing listthird party advisoryus government resourceaf854a3a-2127-422b-91ae-364da2661108
https://www.darkreading.com/remote-workforce/microsoft-rushes-emergency-fix-exploited-sharepoint-toolshell-flawpress/media coverageaf854a3a-2127-422b-91ae-364da2661108
https://www.forbes.com/sites/daveywinder/2025/07/20/microsoft-confirms-ongoing-mass-sharepoint-attack---no-patch-available/press/media coverageaf854a3a-2127-422b-91ae-364da2661108
https://x.com/Shadowserver/status/1946900837306868163third party advisoryaf854a3a-2127-422b-91ae-364da2661108
© 2025 CveMate. All rights reserved.v0.1.3