CVE-2025-53770
Analyzed
Published: 20 Jul 2025, 01:15
Last modified:27 Oct 2025, 17:12
Vulnerability Summary
Overall Risk
Critical Risk
97/100 AI Analysis
Emergency
Requires Immediate Action AI Detection
Active in Wild
Exploitation Detected CVSS Score
9.8 CRITICAL
CVSS v3.1 (MICROSOFT)
EPSS Score
87.23% CRITICAL
87% probability +0.02%
CISA KEV
Listed
Microsoft
Ransomware
Known Use
Exploits
2 found
Dark Web
Activity detected
Telegram
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.
Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild.
Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Source Identifier: secure@microsoft.com
| CVSS | Source | Severity | Exploit. | Impact | Vector |
|---|---|---|---|---|---|
| v4.0 | n/a | ||||
| v3.1 | secure@microsoft.com | 9.8 CRITICAL | 3.9 | 5.9 | CVSS:3.1/AV:N/AC:L/PR:N/U... |
| v3.0 | n/a | ||||
| v2.0 | n/a | ||||
87.55%
Current Score
+0.02%
99%ile
Percentile Rank
0.00%
Loading chart...
Loading chart...
Deserialization of Untrusted Data CWE-502
Description:The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Vulnerability Name:Microsoft SharePoint Deserialization of Untrusted Data Vulnerability
Added to CISA Catalog:20 Jul 2025, 00:00
Action Due:21 Jul 2025, 00:00
Known Ransomware: Ransomware
Required Action:Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.
metasploit
Windows
exploitVerifiedAuthors: Viettel Cyber Security, sfewer-r7
Published: 08 Jul 2025, 00:00
Updated: 06 Aug 2025, 15:33
This module exploits the authentication bypass vulnerabilities CVE-2025-49706 and CVE-2025-53771, and an unsafe
deserialization vulnerability CVE-2025-49704, to achieve unauthenticated RCE against a vulnerable Microsoft
SharePoint Server. The vulnerability CVE-2025-53770 was disclosed as being a patch bypass of CVE-2025-49704,
and as described by the finders, CVE-2025-53770 targets a different endpoint within the /_vti_bin/ URI path.
As this exploit module does not target the endpoint associated with CVE-2025-53770 (per the original finders),
we believe this module is best described as exploiting CVE-2025-49704 and not CVE-2025-53770.
CVE-2025-49704CVE-2025-49706CVE-2025-53770CVE-2025-53771blog.viettelcybersecurity.com/sharepoint-toolshell/blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/securelist.com/toolshell-explained/zerodayinitiative.com/advisories/ZDI-25-580/zerodayinitiative.com/advisories/ZDI-25-581/msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
Affected Configurations (CPE)
microsoft sharepoint_serverVulnerable
Version: *
cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
microsoft sharepoint_serverVulnerable
Version: 2016
cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
microsoft sharepoint_serverVulnerable
Version: 2019
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*